Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-61729 (GCVE-0-2025-61729)
Vulnerability from cvelistv5 – Published: 2025-12-02 18:54 – Updated: 2025-12-03 19:37- CWE-400 - Uncontrolled Resource Consumption
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Go standard library | crypto/x509 |
Affected:
0 , < 1.24.11
(semver)
Affected: 1.25.0 , < 1.25.5 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-61729",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-02T21:52:36.341575Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-02T21:52:58.224Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "crypto/x509",
"product": "crypto/x509",
"programRoutines": [
{
"name": "Certificate.VerifyHostname"
},
{
"name": "Certificate.Verify"
}
],
"vendor": "Go standard library",
"versions": [
{
"lessThan": "1.24.11",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "1.25.5",
"status": "affected",
"version": "1.25.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Philippe Antoine (Catena cyber)"
}
],
"descriptions": [
{
"lang": "en",
"value": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-400: Uncontrolled Resource Consumption",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-03T19:37:14.903Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/cl/725920"
},
{
"url": "https://go.dev/issue/76445"
},
{
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"title": "Excessive resource consumption when printing error string for host certificate validation in crypto/x509"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2025-61729",
"datePublished": "2025-12-02T18:54:10.166Z",
"dateReserved": "2025-09-30T15:05:03.605Z",
"dateUpdated": "2025-12-03T19:37:14.903Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-61729\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2025-12-02T19:15:51.447\",\"lastModified\":\"2025-12-19T18:25:28.283\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.24.11\",\"matchCriteriaId\":\"F2E6FD2A-A487-4099-B91D-2429F286AC6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.25.0\",\"versionEndExcluding\":\"1.25.5\",\"matchCriteriaId\":\"39C03A37-B94B-46E4-B1C2-A70A870F8E53\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/725920\",\"source\":\"security@golang.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://go.dev/issue/76445\",\"source\":\"security@golang.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/8FJoBkPddm4\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\",\"Release Notes\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2025-4155\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-61729\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-02T21:52:36.341575Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-02T21:52:53.822Z\"}}], \"cna\": {\"title\": \"Excessive resource consumption when printing error string for host certificate validation in crypto/x509\", \"credits\": [{\"lang\": \"en\", \"value\": \"Philippe Antoine (Catena cyber)\"}], \"affected\": [{\"vendor\": \"Go standard library\", \"product\": \"crypto/x509\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.24.11\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.25.0\", \"lessThan\": \"1.25.5\", \"versionType\": \"semver\"}], \"packageName\": \"crypto/x509\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"Certificate.VerifyHostname\"}, {\"name\": \"Certificate.Verify\"}]}], \"references\": [{\"url\": \"https://go.dev/cl/725920\"}, {\"url\": \"https://go.dev/issue/76445\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/8FJoBkPddm4\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2025-4155\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-400: Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2025-12-03T19:37:14.903Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-61729\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-03T19:37:14.903Z\", \"dateReserved\": \"2025-09-30T15:05:03.605Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2025-12-02T18:54:10.166Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
OPENSUSE-SU-2025:20158-1
Vulnerability from csaf_opensuse - Published: 2025-12-12 07:45 - Updated: 2025-12-12 07:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.11.\n\nSecurity issues fixed:\n\n- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion\n (bsc#1251258).\n- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation\n (bsc#1254431).\n\n\nOther issues fixed and changes:\n\n- Version 1.24.11:\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364\n cores\n\n- Version 1.24.10:\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n\n- Version 1.24.9:\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n\n- Version 1.24.8:\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n\n- Version 1.24.7:\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#74821 cmd/go: \"get toolchain@latest\" should ignore release candidates\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n\n- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).\n- Package svgpan.js to fix issues with \"go tool pprof\" (bsc#1249985).\n- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-103",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_20158-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2025-12-12T07:45:01Z",
"generator": {
"date": "2025-12-12T07:45:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:20158-1",
"initial_release_date": "2025-12-12T07:45:01Z",
"revision_history": [
{
"date": "2025-12-12T07:45:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.11-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.11-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.11-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.11-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-1.24.11-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.11-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.11-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.11-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2025:15807-1
Vulnerability from csaf_opensuse - Published: 2025-12-09 00:00 - Updated: 2025-12-09 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "regclient-0.11.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the regclient-0.11.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15807",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15807-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "regclient-0.11.1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-09T00:00:00Z",
"generator": {
"date": "2025-12-09T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15807-1",
"initial_release_date": "2025-12-09T00:00:00Z",
"revision_history": [
{
"date": "2025-12-09T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "regclient-0.11.1-1.1.aarch64",
"product": {
"name": "regclient-0.11.1-1.1.aarch64",
"product_id": "regclient-0.11.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "regclient-bash-completion-0.11.1-1.1.aarch64",
"product": {
"name": "regclient-bash-completion-0.11.1-1.1.aarch64",
"product_id": "regclient-bash-completion-0.11.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "regclient-fish-completion-0.11.1-1.1.aarch64",
"product": {
"name": "regclient-fish-completion-0.11.1-1.1.aarch64",
"product_id": "regclient-fish-completion-0.11.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "regclient-zsh-completion-0.11.1-1.1.aarch64",
"product": {
"name": "regclient-zsh-completion-0.11.1-1.1.aarch64",
"product_id": "regclient-zsh-completion-0.11.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "regclient-0.11.1-1.1.ppc64le",
"product": {
"name": "regclient-0.11.1-1.1.ppc64le",
"product_id": "regclient-0.11.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "regclient-bash-completion-0.11.1-1.1.ppc64le",
"product": {
"name": "regclient-bash-completion-0.11.1-1.1.ppc64le",
"product_id": "regclient-bash-completion-0.11.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "regclient-fish-completion-0.11.1-1.1.ppc64le",
"product": {
"name": "regclient-fish-completion-0.11.1-1.1.ppc64le",
"product_id": "regclient-fish-completion-0.11.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "regclient-zsh-completion-0.11.1-1.1.ppc64le",
"product": {
"name": "regclient-zsh-completion-0.11.1-1.1.ppc64le",
"product_id": "regclient-zsh-completion-0.11.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "regclient-0.11.1-1.1.s390x",
"product": {
"name": "regclient-0.11.1-1.1.s390x",
"product_id": "regclient-0.11.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "regclient-bash-completion-0.11.1-1.1.s390x",
"product": {
"name": "regclient-bash-completion-0.11.1-1.1.s390x",
"product_id": "regclient-bash-completion-0.11.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "regclient-fish-completion-0.11.1-1.1.s390x",
"product": {
"name": "regclient-fish-completion-0.11.1-1.1.s390x",
"product_id": "regclient-fish-completion-0.11.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "regclient-zsh-completion-0.11.1-1.1.s390x",
"product": {
"name": "regclient-zsh-completion-0.11.1-1.1.s390x",
"product_id": "regclient-zsh-completion-0.11.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "regclient-0.11.1-1.1.x86_64",
"product": {
"name": "regclient-0.11.1-1.1.x86_64",
"product_id": "regclient-0.11.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "regclient-bash-completion-0.11.1-1.1.x86_64",
"product": {
"name": "regclient-bash-completion-0.11.1-1.1.x86_64",
"product_id": "regclient-bash-completion-0.11.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "regclient-fish-completion-0.11.1-1.1.x86_64",
"product": {
"name": "regclient-fish-completion-0.11.1-1.1.x86_64",
"product_id": "regclient-fish-completion-0.11.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "regclient-zsh-completion-0.11.1-1.1.x86_64",
"product": {
"name": "regclient-zsh-completion-0.11.1-1.1.x86_64",
"product_id": "regclient-zsh-completion-0.11.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-0.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64"
},
"product_reference": "regclient-0.11.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-0.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le"
},
"product_reference": "regclient-0.11.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-0.11.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x"
},
"product_reference": "regclient-0.11.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-0.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64"
},
"product_reference": "regclient-0.11.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-bash-completion-0.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64"
},
"product_reference": "regclient-bash-completion-0.11.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-bash-completion-0.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le"
},
"product_reference": "regclient-bash-completion-0.11.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-bash-completion-0.11.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x"
},
"product_reference": "regclient-bash-completion-0.11.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-bash-completion-0.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64"
},
"product_reference": "regclient-bash-completion-0.11.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-fish-completion-0.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64"
},
"product_reference": "regclient-fish-completion-0.11.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-fish-completion-0.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le"
},
"product_reference": "regclient-fish-completion-0.11.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-fish-completion-0.11.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x"
},
"product_reference": "regclient-fish-completion-0.11.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-fish-completion-0.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64"
},
"product_reference": "regclient-fish-completion-0.11.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-zsh-completion-0.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64"
},
"product_reference": "regclient-zsh-completion-0.11.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-zsh-completion-0.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le"
},
"product_reference": "regclient-zsh-completion-0.11.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-zsh-completion-0.11.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x"
},
"product_reference": "regclient-zsh-completion-0.11.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-zsh-completion-0.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
},
"product_reference": "regclient-zsh-completion-0.11.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2025:15817-1
Vulnerability from csaf_opensuse - Published: 2025-12-12 00:00 - Updated: 2025-12-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "buildpacks-cli-0.39.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the buildpacks-cli-0.39.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15817",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15817-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "buildpacks-cli-0.39.1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-12T00:00:00Z",
"generator": {
"date": "2025-12-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15817-1",
"initial_release_date": "2025-12-12T00:00:00Z",
"revision_history": [
{
"date": "2025-12-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "buildpacks-cli-0.39.1-1.1.aarch64",
"product": {
"name": "buildpacks-cli-0.39.1-1.1.aarch64",
"product_id": "buildpacks-cli-0.39.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"product": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"product_id": "buildpacks-cli-bash-completion-0.39.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"product": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"product_id": "buildpacks-cli-fish-completion-0.39.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"product": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"product_id": "buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildpacks-cli-0.39.1-1.1.ppc64le",
"product": {
"name": "buildpacks-cli-0.39.1-1.1.ppc64le",
"product_id": "buildpacks-cli-0.39.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"product": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"product_id": "buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"product": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"product_id": "buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"product": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"product_id": "buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildpacks-cli-0.39.1-1.1.s390x",
"product": {
"name": "buildpacks-cli-0.39.1-1.1.s390x",
"product_id": "buildpacks-cli-0.39.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"product": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"product_id": "buildpacks-cli-bash-completion-0.39.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"product": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"product_id": "buildpacks-cli-fish-completion-0.39.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"product": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"product_id": "buildpacks-cli-zsh-completion-0.39.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "buildpacks-cli-0.39.1-1.1.x86_64",
"product": {
"name": "buildpacks-cli-0.39.1-1.1.x86_64",
"product_id": "buildpacks-cli-0.39.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"product": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"product_id": "buildpacks-cli-bash-completion-0.39.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"product": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"product_id": "buildpacks-cli-fish-completion-0.39.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64",
"product": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64",
"product_id": "buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-0.39.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64"
},
"product_reference": "buildpacks-cli-0.39.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-0.39.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le"
},
"product_reference": "buildpacks-cli-0.39.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-0.39.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x"
},
"product_reference": "buildpacks-cli-0.39.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-0.39.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64"
},
"product_reference": "buildpacks-cli-0.39.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64"
},
"product_reference": "buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le"
},
"product_reference": "buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x"
},
"product_reference": "buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64"
},
"product_reference": "buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64"
},
"product_reference": "buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le"
},
"product_reference": "buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x"
},
"product_reference": "buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64"
},
"product_reference": "buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64"
},
"product_reference": "buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le"
},
"product_reference": "buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x"
},
"product_reference": "buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
},
"product_reference": "buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2026:10030-1
Vulnerability from csaf_opensuse - Published: 2026-01-12 00:00 - Updated: 2026-01-12 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "k6-1.5.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the k6-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10030",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10030-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "k6-1.5.0-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-12T00:00:00Z",
"generator": {
"date": "2026-01-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10030-1",
"initial_release_date": "2026-01-12T00:00:00Z",
"revision_history": [
{
"date": "2026-01-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "k6-1.5.0-1.1.aarch64",
"product": {
"name": "k6-1.5.0-1.1.aarch64",
"product_id": "k6-1.5.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "k6-bash-completion-1.5.0-1.1.aarch64",
"product": {
"name": "k6-bash-completion-1.5.0-1.1.aarch64",
"product_id": "k6-bash-completion-1.5.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "k6-fish-completion-1.5.0-1.1.aarch64",
"product": {
"name": "k6-fish-completion-1.5.0-1.1.aarch64",
"product_id": "k6-fish-completion-1.5.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "k6-zsh-completion-1.5.0-1.1.aarch64",
"product": {
"name": "k6-zsh-completion-1.5.0-1.1.aarch64",
"product_id": "k6-zsh-completion-1.5.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "k6-1.5.0-1.1.ppc64le",
"product": {
"name": "k6-1.5.0-1.1.ppc64le",
"product_id": "k6-1.5.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "k6-bash-completion-1.5.0-1.1.ppc64le",
"product": {
"name": "k6-bash-completion-1.5.0-1.1.ppc64le",
"product_id": "k6-bash-completion-1.5.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "k6-fish-completion-1.5.0-1.1.ppc64le",
"product": {
"name": "k6-fish-completion-1.5.0-1.1.ppc64le",
"product_id": "k6-fish-completion-1.5.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "k6-zsh-completion-1.5.0-1.1.ppc64le",
"product": {
"name": "k6-zsh-completion-1.5.0-1.1.ppc64le",
"product_id": "k6-zsh-completion-1.5.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "k6-1.5.0-1.1.s390x",
"product": {
"name": "k6-1.5.0-1.1.s390x",
"product_id": "k6-1.5.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "k6-bash-completion-1.5.0-1.1.s390x",
"product": {
"name": "k6-bash-completion-1.5.0-1.1.s390x",
"product_id": "k6-bash-completion-1.5.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "k6-fish-completion-1.5.0-1.1.s390x",
"product": {
"name": "k6-fish-completion-1.5.0-1.1.s390x",
"product_id": "k6-fish-completion-1.5.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "k6-zsh-completion-1.5.0-1.1.s390x",
"product": {
"name": "k6-zsh-completion-1.5.0-1.1.s390x",
"product_id": "k6-zsh-completion-1.5.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "k6-1.5.0-1.1.x86_64",
"product": {
"name": "k6-1.5.0-1.1.x86_64",
"product_id": "k6-1.5.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "k6-bash-completion-1.5.0-1.1.x86_64",
"product": {
"name": "k6-bash-completion-1.5.0-1.1.x86_64",
"product_id": "k6-bash-completion-1.5.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "k6-fish-completion-1.5.0-1.1.x86_64",
"product": {
"name": "k6-fish-completion-1.5.0-1.1.x86_64",
"product_id": "k6-fish-completion-1.5.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "k6-zsh-completion-1.5.0-1.1.x86_64",
"product": {
"name": "k6-zsh-completion-1.5.0-1.1.x86_64",
"product_id": "k6-zsh-completion-1.5.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-1.5.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-1.5.0-1.1.aarch64"
},
"product_reference": "k6-1.5.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-1.5.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-1.5.0-1.1.ppc64le"
},
"product_reference": "k6-1.5.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-1.5.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-1.5.0-1.1.s390x"
},
"product_reference": "k6-1.5.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-1.5.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-1.5.0-1.1.x86_64"
},
"product_reference": "k6-1.5.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-bash-completion-1.5.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.aarch64"
},
"product_reference": "k6-bash-completion-1.5.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-bash-completion-1.5.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.ppc64le"
},
"product_reference": "k6-bash-completion-1.5.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-bash-completion-1.5.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.s390x"
},
"product_reference": "k6-bash-completion-1.5.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-bash-completion-1.5.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.x86_64"
},
"product_reference": "k6-bash-completion-1.5.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-fish-completion-1.5.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.aarch64"
},
"product_reference": "k6-fish-completion-1.5.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-fish-completion-1.5.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.ppc64le"
},
"product_reference": "k6-fish-completion-1.5.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-fish-completion-1.5.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.s390x"
},
"product_reference": "k6-fish-completion-1.5.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-fish-completion-1.5.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.x86_64"
},
"product_reference": "k6-fish-completion-1.5.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-zsh-completion-1.5.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.aarch64"
},
"product_reference": "k6-zsh-completion-1.5.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-zsh-completion-1.5.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.ppc64le"
},
"product_reference": "k6-zsh-completion-1.5.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-zsh-completion-1.5.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.s390x"
},
"product_reference": "k6-zsh-completion-1.5.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-zsh-completion-1.5.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.x86_64"
},
"product_reference": "k6-zsh-completion-1.5.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:k6-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:k6-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:k6-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2025:15795-1
Vulnerability from csaf_opensuse - Published: 2025-12-03 00:00 - Updated: 2025-12-03 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.25-1.25.5-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.25-1.25.5-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15795",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15795-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "go1.25-1.25.5-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-03T00:00:00Z",
"generator": {
"date": "2025-12-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15795-1",
"initial_release_date": "2025-12-03T00:00:00Z",
"revision_history": [
{
"date": "2025-12-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-1.1.aarch64",
"product": {
"name": "go1.25-1.25.5-1.1.aarch64",
"product_id": "go1.25-1.25.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.5-1.1.aarch64",
"product_id": "go1.25-doc-1.25.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.5-1.1.aarch64",
"product_id": "go1.25-libstd-1.25.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.5-1.1.aarch64",
"product_id": "go1.25-race-1.25.5-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-1.1.ppc64le",
"product": {
"name": "go1.25-1.25.5-1.1.ppc64le",
"product_id": "go1.25-1.25.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.5-1.1.ppc64le",
"product_id": "go1.25-doc-1.25.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-1.1.ppc64le",
"product": {
"name": "go1.25-libstd-1.25.5-1.1.ppc64le",
"product_id": "go1.25-libstd-1.25.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.5-1.1.ppc64le",
"product_id": "go1.25-race-1.25.5-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-1.1.s390x",
"product": {
"name": "go1.25-1.25.5-1.1.s390x",
"product_id": "go1.25-1.25.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.5-1.1.s390x",
"product_id": "go1.25-doc-1.25.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-1.1.s390x",
"product": {
"name": "go1.25-libstd-1.25.5-1.1.s390x",
"product_id": "go1.25-libstd-1.25.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-1.1.s390x",
"product": {
"name": "go1.25-race-1.25.5-1.1.s390x",
"product_id": "go1.25-race-1.25.5-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-1.1.x86_64",
"product": {
"name": "go1.25-1.25.5-1.1.x86_64",
"product_id": "go1.25-1.25.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.5-1.1.x86_64",
"product_id": "go1.25-doc-1.25.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.5-1.1.x86_64",
"product_id": "go1.25-libstd-1.25.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.5-1.1.x86_64",
"product_id": "go1.25-race-1.25.5-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64"
},
"product_reference": "go1.25-1.25.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x"
},
"product_reference": "go1.25-1.25.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64"
},
"product_reference": "go1.25-1.25.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le"
},
"product_reference": "go1.25-libstd-1.25.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x"
},
"product_reference": "go1.25-libstd-1.25.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2025:15796-1
Vulnerability from csaf_opensuse - Published: 2025-12-04 00:00 - Updated: 2025-12-04 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.24-1.24.11-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.24-1.24.11-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15796",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15796-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "go1.24-1.24.11-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-04T00:00:00Z",
"generator": {
"date": "2025-12-04T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15796-1",
"initial_release_date": "2025-12-04T00:00:00Z",
"revision_history": [
{
"date": "2025-12-04T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-1.1.aarch64",
"product": {
"name": "go1.24-1.24.11-1.1.aarch64",
"product_id": "go1.24-1.24.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.11-1.1.aarch64",
"product_id": "go1.24-doc-1.24.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.11-1.1.aarch64",
"product_id": "go1.24-libstd-1.24.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.11-1.1.aarch64",
"product_id": "go1.24-race-1.24.11-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-1.1.ppc64le",
"product": {
"name": "go1.24-1.24.11-1.1.ppc64le",
"product_id": "go1.24-1.24.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.11-1.1.ppc64le",
"product_id": "go1.24-doc-1.24.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-1.1.ppc64le",
"product": {
"name": "go1.24-libstd-1.24.11-1.1.ppc64le",
"product_id": "go1.24-libstd-1.24.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.11-1.1.ppc64le",
"product_id": "go1.24-race-1.24.11-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-1.1.s390x",
"product": {
"name": "go1.24-1.24.11-1.1.s390x",
"product_id": "go1.24-1.24.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.11-1.1.s390x",
"product_id": "go1.24-doc-1.24.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-1.1.s390x",
"product": {
"name": "go1.24-libstd-1.24.11-1.1.s390x",
"product_id": "go1.24-libstd-1.24.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-1.1.s390x",
"product": {
"name": "go1.24-race-1.24.11-1.1.s390x",
"product_id": "go1.24-race-1.24.11-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-1.1.x86_64",
"product": {
"name": "go1.24-1.24.11-1.1.x86_64",
"product_id": "go1.24-1.24.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.11-1.1.x86_64",
"product_id": "go1.24-doc-1.24.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.11-1.1.x86_64",
"product_id": "go1.24-libstd-1.24.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.11-1.1.x86_64",
"product_id": "go1.24-race-1.24.11-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64"
},
"product_reference": "go1.24-1.24.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x"
},
"product_reference": "go1.24-1.24.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64"
},
"product_reference": "go1.24-1.24.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le"
},
"product_reference": "go1.24-libstd-1.24.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x"
},
"product_reference": "go1.24-libstd-1.24.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2025:20157-1
Vulnerability from csaf_opensuse - Published: 2025-12-12 07:23 - Updated: 2025-12-12 07:23Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.5.\n\nSecurity issues fixed:\n\n- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation\n (bsc#1254431).\n- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion\n (bsc#1251258).\n- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n- CVE-2025-47910: net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n\nOther issues fixed and changes:\n\n- Version 1.25.5:\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access\n is denied, ReOpenFile error handling followup\n\n- Version 1.25.4:\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access\n is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n\n- Version 1.25.3:\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n\n- Version 1.25.2:\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \"file exists\" when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n\n- Version 1.25.1:\n * go#74822 cmd/go: \"get toolchain@latest\" should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n\n- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).\n- Fix runtime condition for gcc/gcc7 dependency.\n- Use at least gcc 7 for all architectures (bsc#1254227).\n- Package svgpan.js to fix issues with \"go tool pprof\" (boo#1249985).\n- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-102",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_20157-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2025-12-12T07:23:58Z",
"generator": {
"date": "2025-12-12T07:23:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:20157-1",
"initial_release_date": "2025-12-12T07:23:58Z",
"revision_history": [
{
"date": "2025-12-12T07:23:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.5-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.5-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.5-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.5-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-1.25.5-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.5-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.5-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.5-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
RHSA-2026:2138
Vulnerability from csaf_redhat - Published: 2026-02-05 15:35 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The 1.3.2 release of Red Hat Trusted Artifact Signer OpenShift Operator.\nFor more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"title": "Topic"
},
{
"category": "general",
"text": "The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, and 4.20",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2138",
"url": "https://access.redhat.com/errata/RHSA-2026:2138"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2138.json"
}
],
"title": "Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release",
"tracking": {
"current_release_date": "2026-02-11T08:53:12+00:00",
"generator": {
"date": "2026-02-11T08:53:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2138",
"initial_release_date": "2026-02-05T15:35:02+00:00",
"revision_history": [
{
"date": "2026-02-05T15:35:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T15:35:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Trusted Artifact Signer 1.3",
"product": {
"name": "Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:trusted_artifact_signer:1.3::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Trusted Artifact Signer"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64",
"product_id": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rekor-monitor-rhel9@sha256%3Af8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770110084"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:35:02+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2138"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1497
Vulnerability from csaf_redhat - Published: 2026-01-28 15:32 - Updated: 2026-02-11 08:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Ansible Automation Platform 2.4\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.\n\nSecurity Fix(es):\n\n* automation-controller: Django: Algorithmic complexity in XML Deserializer leads to denial of service (CVE-2025-64460)\n* automation-controller: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)\n* automation-controller: AIOHTTP\u0027s HTTP Parser auto_decompress feature is vulnerable to zip bomb (CVE-2025-69223)\n* receptor: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nUpdates and fixes included for Automation controller:\n* Restored the usage of system_tracking_logger (AAP-60506)\n* Fixed issue where jobs from other template sometimes appeared on template jobs page (AAP-59615)\n* Fixed the UI to display more than 25 input inventories in constructed inventories detail/edit form (AAP-59568)\n* Reduced number of API calls while scrolling through job output (AAP-58255)\n* automation-controller has been updated to 4.5.30\n* receptor has been updated to 1.6.3",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1497",
"url": "https://access.redhat.com/errata/RHSA-2026:1497"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.4/html/red_hat_ansible_automation_platform_release_notes/asynchronous_updates",
"url": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.4/html/red_hat_ansible_automation_platform_release_notes/asynchronous_updates"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.4#Installation%20and%20upgrade",
"url": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.4#Installation%20and%20upgrade"
},
{
"category": "external",
"summary": "2418366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418366"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "2427456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427456"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1497.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update",
"tracking": {
"current_release_date": "2026-02-11T08:52:48+00:00",
"generator": {
"date": "2026-02-11T08:52:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1497",
"initial_release_date": "2026-01-28T15:32:13+00:00",
"revision_history": [
{
"date": "2026-01-28T15:32:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-28T15:32:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:52:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ansible Automation Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.5.30-1.el8ap.src",
"product": {
"name": "automation-controller-0:4.5.30-1.el8ap.src",
"product_id": "automation-controller-0:4.5.30-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.30-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.src",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.src",
"product_id": "receptor-0:1.6.3-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.5.30-1.el9ap.src",
"product": {
"name": "automation-controller-0:4.5.30-1.el9ap.src",
"product_id": "automation-controller-0:4.5.30-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.30-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.src",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.src",
"product_id": "receptor-0:1.6.3-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"product": {
"name": "automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"product_id": "automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-cli@4.5.30-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-server-0:4.5.30-1.el8ap.noarch",
"product": {
"name": "automation-controller-server-0:4.5.30-1.el8ap.noarch",
"product_id": "automation-controller-server-0:4.5.30-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-server@4.5.30-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"product": {
"name": "automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"product_id": "automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-ui@4.5.30-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "receptorctl-0:1.6.3-1.el8ap.noarch",
"product": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch",
"product_id": "receptorctl-0:1.6.3-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptorctl@1.6.3-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"product": {
"name": "automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"product_id": "automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-cli@4.5.30-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-server-0:4.5.30-1.el9ap.noarch",
"product": {
"name": "automation-controller-server-0:4.5.30-1.el9ap.noarch",
"product_id": "automation-controller-server-0:4.5.30-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-server@4.5.30-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"product": {
"name": "automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"product_id": "automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-ui@4.5.30-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "receptorctl-0:1.6.3-1.el9ap.noarch",
"product": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch",
"product_id": "receptorctl-0:1.6.3-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptorctl@1.6.3-1.el9ap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.5.30-1.el8ap.x86_64",
"product": {
"name": "automation-controller-0:4.5.30-1.el8ap.x86_64",
"product_id": "automation-controller-0:4.5.30-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.30-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"product": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"product_id": "automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.30-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.x86_64",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64",
"product_id": "receptor-0:1.6.3-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.5.30-1.el9ap.x86_64",
"product": {
"name": "automation-controller-0:4.5.30-1.el9ap.x86_64",
"product_id": "automation-controller-0:4.5.30-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.30-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"product": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"product_id": "automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.30-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.x86_64",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64",
"product_id": "receptor-0:1.6.3-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.5.30-1.el8ap.ppc64le",
"product": {
"name": "automation-controller-0:4.5.30-1.el8ap.ppc64le",
"product_id": "automation-controller-0:4.5.30-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.30-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"product": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"product_id": "automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.30-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.ppc64le",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le",
"product_id": "receptor-0:1.6.3-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.5.30-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-0:4.5.30-1.el9ap.ppc64le",
"product_id": "automation-controller-0:4.5.30-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.30-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"product_id": "automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.30-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.ppc64le",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le",
"product_id": "receptor-0:1.6.3-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.5.30-1.el8ap.s390x",
"product": {
"name": "automation-controller-0:4.5.30-1.el8ap.s390x",
"product_id": "automation-controller-0:4.5.30-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.30-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"product": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"product_id": "automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.30-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.s390x",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.s390x",
"product_id": "receptor-0:1.6.3-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.5.30-1.el9ap.s390x",
"product": {
"name": "automation-controller-0:4.5.30-1.el9ap.s390x",
"product_id": "automation-controller-0:4.5.30-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.30-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"product": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"product_id": "automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.30-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.s390x",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.s390x",
"product_id": "receptor-0:1.6.3-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.5.30-1.el8ap.aarch64",
"product": {
"name": "automation-controller-0:4.5.30-1.el8ap.aarch64",
"product_id": "automation-controller-0:4.5.30-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.30-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"product": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"product_id": "automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.30-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.aarch64",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64",
"product_id": "receptor-0:1.6.3-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.5.30-1.el9ap.aarch64",
"product": {
"name": "automation-controller-0:4.5.30-1.el9ap.aarch64",
"product_id": "automation-controller-0:4.5.30-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.30-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"product": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"product_id": "automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.30-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.aarch64",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64",
"product_id": "receptor-0:1.6.3-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64"
},
"product_reference": "automation-controller-0:4.5.30-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-0:4.5.30-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x"
},
"product_reference": "automation-controller-0:4.5.30-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src"
},
"product_reference": "automation-controller-0:4.5.30-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64"
},
"product_reference": "automation-controller-0:4.5.30-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.5.30-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.5.30-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch"
},
"product_reference": "automation-controller-server-0:4.5.30-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.5.30-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64"
},
"product_reference": "automation-controller-0:4.5.30-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-0:4.5.30-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x"
},
"product_reference": "automation-controller-0:4.5.30-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src"
},
"product_reference": "automation-controller-0:4.5.30-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64"
},
"product_reference": "automation-controller-0:4.5.30-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.5.30-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.5.30-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch"
},
"product_reference": "automation-controller-server-0:4.5.30-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.5.30-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64"
},
"product_reference": "automation-controller-0:4.5.30-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-0:4.5.30-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x"
},
"product_reference": "automation-controller-0:4.5.30-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src"
},
"product_reference": "automation-controller-0:4.5.30-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64"
},
"product_reference": "automation-controller-0:4.5.30-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.5.30-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.5.30-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch"
},
"product_reference": "automation-controller-server-0:4.5.30-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.5.30-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64"
},
"product_reference": "automation-controller-0:4.5.30-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-0:4.5.30-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x"
},
"product_reference": "automation-controller-0:4.5.30-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src"
},
"product_reference": "automation-controller-0:4.5.30-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.30-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64"
},
"product_reference": "automation-controller-0:4.5.30-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.5.30-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.5.30-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch"
},
"product_reference": "automation-controller-server-0:4.5.30-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.5.30-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T15:32:13+00:00",
"details": "For details on how to apply this update, refer to Ansible Automation Platform documentation.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1497"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-64460",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2025-12-02T16:01:05.300335+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418366"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Django. This vulnerability allows a remote attacker to cause a potential denial-of-service (DoS) attack triggering Central Processing Unit (CPU) and memory exhaustion via specially crafted Extensible Markup Language (XML) input processed by the XML Deserializer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Django: Django: Algorithmic complexity in XML Deserializer leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that process XML input using Django\u0027s XML Deserializer, including Red Hat Ansible Automation Platform, Red Hat OpenStack Platform, and OpenShift Service Mesh. A remote attacker can exploit this flaw by providing specially crafted XML, leading to a denial-of-service due to CPU and memory exhaustion.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64460"
},
{
"category": "external",
"summary": "RHBZ#2418366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64460"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460"
},
{
"category": "external",
"summary": "https://docs.djangoproject.com/en/dev/releases/security/",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"category": "external",
"summary": "https://groups.google.com/g/django-announce",
"url": "https://groups.google.com/g/django-announce"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/",
"url": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/"
}
],
"release_date": "2025-12-02T15:15:34.451000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T15:32:13+00:00",
"details": "For details on how to apply this update, refer to Ansible Automation Platform documentation.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1497"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Django: Django: Algorithmic complexity in XML Deserializer leads to denial of service"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T15:32:13+00:00",
"details": "For details on how to apply this update, refer to Ansible Automation Platform documentation.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1497"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-69223",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-06T20:01:19.831548+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427456"
}
],
"notes": [
{
"category": "description",
"text": "AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow a zip bomb to be used to execute a DoS against the AIOHTTP server. An attacker may be able to send a compressed request that when decompressed by AIOHTTP could exhaust the host\u0027s memory. This issue is fixed in version 3.13.3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: AIOHTTP\u0027s HTTP Parser auto_decompress feature is vulnerable to zip bomb",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69223"
},
{
"category": "external",
"summary": "RHBZ#2427456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69223"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/2b920c39002cee0ec5b402581779bbaaf7c9138a",
"url": "https://github.com/aio-libs/aiohttp/commit/2b920c39002cee0ec5b402581779bbaaf7c9138a"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6mq8-rvhq-8wgg",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6mq8-rvhq-8wgg"
}
],
"release_date": "2026-01-05T22:00:17.715000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T15:32:13+00:00",
"details": "For details on how to apply this update, refer to Ansible Automation Platform documentation.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1497"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.30-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.30-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "aiohttp: AIOHTTP\u0027s HTTP Parser auto_decompress feature is vulnerable to zip bomb"
}
]
}
RHSA-2026:0921
Vulnerability from csaf_redhat - Published: 2026-01-21 10:01 - Updated: 2026-02-11 08:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0921",
"url": "https://access.redhat.com/errata/RHSA-2026:0921"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0921.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2026-02-11T08:52:20+00:00",
"generator": {
"date": "2026-02-11T08:52:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:0921",
"initial_release_date": "2026-01-21T10:01:30+00:00",
"revision_history": [
{
"date": "2026-01-21T10:01:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-21T10:01:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:52:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=src\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.src (go-toolset:rhel8)",
"product_id": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=src\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64 (go-toolset:rhel8)",
"product_id": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le (go-toolset:rhel8)",
"product_id": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x (go-toolset:rhel8)",
"product_id": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.module%2Bel8.10.0%2B23901%2B9d60aaf1?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260119042017:a3795dee"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T10:01:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0921"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.5-1.module+el8.10.0+23901+9d60aaf1.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2265
Vulnerability from csaf_redhat - Published: 2026-02-09 05:56 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-github-openprinting-ipp-usb is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables\n driverless support for USB devices capable of using IPP-over-USB protocol.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2265",
"url": "https://access.redhat.com/errata/RHSA-2026:2265"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2265.json"
}
],
"title": "Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:16+00:00",
"generator": {
"date": "2026-02-11T08:53:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2265",
"initial_release_date": "2026-02-09T05:56:42+00:00",
"revision_history": [
{
"date": "2026-02-09T05:56:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T05:56:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"product": {
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"product_id": "golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb@0.9.27-3.el10_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"product": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"product_id": "ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-3.el10_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-3.el10_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"product_id": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-3.el10_0.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"product": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"product_id": "ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-3.el10_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-3.el10_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"product_id": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-3.el10_0.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"product": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"product_id": "ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-3.el10_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-3.el10_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"product_id": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-3.el10_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"product": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"product_id": "ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-3.el10_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-3.el10_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64",
"product_id": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-3.el10_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src"
},
"product_reference": "golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.aarch64"
},
"product_reference": "ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.ppc64le"
},
"product_reference": "ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.s390x"
},
"product_reference": "ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.x86_64"
},
"product_reference": "ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T05:56:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2265"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1038
Vulnerability from csaf_redhat - Published: 2026-01-22 18:00 - Updated: 2026-02-11 13:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cert-manager Operator for Red Hat OpenShift 1.18.1",
"title": "Topic"
},
{
"category": "general",
"text": "The cert-manager Operator for Red Hat OpenShift builds on top of Kubernetes, introducing certificate authorities\nand certificates as first-class resource types in the Kubernetes API. This makes it possible to provide\ncertificates-as-a-service to developers working within your Kubernetes cluster.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1038",
"url": "https://access.redhat.com/errata/RHSA-2026:1038"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html",
"url": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1038.json"
}
],
"title": "Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1",
"tracking": {
"current_release_date": "2026-02-11T13:00:47+00:00",
"generator": {
"date": "2026-02-11T13:00:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1038",
"initial_release_date": "2026-01-22T18:00:37+00:00",
"revision_history": [
{
"date": "2026-01-22T18:00:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-22T18:00:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T13:00:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product": {
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cert_manager:1.18::el9"
}
}
}
],
"category": "product_family",
"name": "cert-manager operator for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3Ae64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44?arch=amd64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769093403"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3Aac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b?arch=s390x\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769093403"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3A0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b?arch=ppc64le\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769093403"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3Ad41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37?arch=arm64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769093403"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T18:00:37+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1038"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T18:00:37+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1038"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T18:00:37+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1038"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:0a03ffd13222ba450598910b4b627757d10913831c5d197e0a510bf9c758ec0b_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:ac74ade1f4712f7c7e17b3532ec5ecaed9aec87cc2a0c4801c7661739de4fd9b_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:d41b8ace40ae0a4d240025acca6e0f3ef27b14c1d6c9d9d2e06ac95f6bac4c37_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:e64804e94fe3781b7d371097e53749867a2b4b1783ada1660b5363e9df3cdb44_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
}
]
}
RHSA-2026:2334
Vulnerability from csaf_redhat - Published: 2026-02-09 12:48 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2334",
"url": "https://access.redhat.com/errata/RHSA-2026:2334"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2334.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:18+00:00",
"generator": {
"date": "2026-02-11T08:53:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2334",
"initial_release_date": "2026-02-09T12:48:48+00:00",
"revision_history": [
{
"date": "2026-02-09T12:48:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T12:48:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src (go-toolset:rhel8)",
"product_id": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=src\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.17.13-2.module%2Bel8.6.0%2B22782%2Bbd95fb4c?arch=src\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src (go-toolset:rhel8)",
"product_id": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=src\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.17.13-2.module%2Bel8.6.0%2B22782%2Bbd95fb4c?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=noarch\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=noarch\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=noarch\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=noarch\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.aarch64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.aarch64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.17.13-2.module%2Bel8.6.0%2B22782%2Bbd95fb4c?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64 (go-toolset:rhel8)",
"product_id": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.ppc64le::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.ppc64le (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.17.13-2.module%2Bel8.6.0%2B22782%2Bbd95fb4c?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le (go-toolset:rhel8)",
"product_id": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.s390x::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.s390x (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.17.13-2.module%2Bel8.6.0%2B22782%2Bbd95fb4c?arch=s390x\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"product": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x (go-toolset:rhel8)",
"product_id": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=s390x\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.17.13-12.module%2Bel8.6.0%2B23956%2Be8c5263b?arch=s390x\u0026rpmmod=go-toolset:rhel8:8060020260203090034:97d7f71f"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.aarch64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.ppc64le::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.s390x::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8"
},
"product_reference": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.aarch64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.ppc64le::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.s390x::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T12:48:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.aarch64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.ppc64le::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.s390x::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2334"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.AUS:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.aarch64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.ppc64le::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.s390x::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.aarch64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.ppc64le::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.s390x::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.E4S:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:go-toolset-0:1.17.13-2.module+el8.6.0+22782+bd95fb4c.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.src::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-bin-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-docs-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-misc-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-race-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.x86_64::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-src-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8",
"AppStream-8.6.0.Z.TUS:golang-tests-0:1.17.13-12.module+el8.6.0+23956+e8c5263b.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2201
Vulnerability from csaf_redhat - Published: 2026-02-05 22:10 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Lightspeed (formerly Insights) for Runtimes on RHEL 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat Lightspeed (formerly Insights) for Runtimes on RHEL 9.\n\nSecurity fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2201",
"url": "https://access.redhat.com/errata/RHSA-2026:2201"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2201.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Lightspeed (formerly Insights) for Runtimes security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:14+00:00",
"generator": {
"date": "2026-02-11T08:53:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2201",
"initial_release_date": "2026-02-05T22:10:05+00:00",
"revision_history": [
{
"date": "2026-02-05T22:10:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T22:10:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
"product": {
"name": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:lightspeed_for_runtimes:1.0::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Lightspeed (formerly Insights) for Runtimes"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:9782b38d317f3bd46c4b312e98ddd845f900bf3dc17d89954e2fc0693d35a363_amd64",
"product": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:9782b38d317f3bd46c4b312e98ddd845f900bf3dc17d89954e2fc0693d35a363_amd64",
"product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:9782b38d317f3bd46c4b312e98ddd845f900bf3dc17d89954e2fc0693d35a363_amd64",
"product_identification_helper": {
"purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3A9782b38d317f3bd46c4b312e98ddd845f900bf3dc17d89954e2fc0693d35a363?arch=amd64\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.0-1770223260"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:215ffb659953b515a6ae4e4162bb641eaa0d7dd548a0d8487b8bce0cc77e07d3_amd64",
"product": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:215ffb659953b515a6ae4e4162bb641eaa0d7dd548a0d8487b8bce0cc77e07d3_amd64",
"product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:215ffb659953b515a6ae4e4162bb641eaa0d7dd548a0d8487b8bce0cc77e07d3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/runtimes-inventory-operator-bundle@sha256%3A215ffb659953b515a6ae4e4162bb641eaa0d7dd548a0d8487b8bce0cc77e07d3?arch=amd64\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.0-1770229956"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:8e161ba88509d7757f7984f59638a55826d8cbb5985f42b07a139e7d2010934a_arm64",
"product": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:8e161ba88509d7757f7984f59638a55826d8cbb5985f42b07a139e7d2010934a_arm64",
"product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:8e161ba88509d7757f7984f59638a55826d8cbb5985f42b07a139e7d2010934a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3A8e161ba88509d7757f7984f59638a55826d8cbb5985f42b07a139e7d2010934a?arch=arm64\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.0-1770223260"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:efa869209e9675e3dcc1ae35f6fd59218f36573dbb87467be82123c625270573_ppc64le",
"product": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:efa869209e9675e3dcc1ae35f6fd59218f36573dbb87467be82123c625270573_ppc64le",
"product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:efa869209e9675e3dcc1ae35f6fd59218f36573dbb87467be82123c625270573_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3Aefa869209e9675e3dcc1ae35f6fd59218f36573dbb87467be82123c625270573?arch=ppc64le\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.0-1770223260"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:a4e92b34cc470c81c2bdf31e7e1c0a14cc1ed50947ebadf27cfc29bbe632cc11_s390x",
"product": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:a4e92b34cc470c81c2bdf31e7e1c0a14cc1ed50947ebadf27cfc29bbe632cc11_s390x",
"product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:a4e92b34cc470c81c2bdf31e7e1c0a14cc1ed50947ebadf27cfc29bbe632cc11_s390x",
"product_identification_helper": {
"purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3Aa4e92b34cc470c81c2bdf31e7e1c0a14cc1ed50947ebadf27cfc29bbe632cc11?arch=s390x\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.0-1770223260"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:215ffb659953b515a6ae4e4162bb641eaa0d7dd548a0d8487b8bce0cc77e07d3_amd64 as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:215ffb659953b515a6ae4e4162bb641eaa0d7dd548a0d8487b8bce0cc77e07d3_amd64"
},
"product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:215ffb659953b515a6ae4e4162bb641eaa0d7dd548a0d8487b8bce0cc77e07d3_amd64",
"relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:8e161ba88509d7757f7984f59638a55826d8cbb5985f42b07a139e7d2010934a_arm64 as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:8e161ba88509d7757f7984f59638a55826d8cbb5985f42b07a139e7d2010934a_arm64"
},
"product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:8e161ba88509d7757f7984f59638a55826d8cbb5985f42b07a139e7d2010934a_arm64",
"relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:9782b38d317f3bd46c4b312e98ddd845f900bf3dc17d89954e2fc0693d35a363_amd64 as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:9782b38d317f3bd46c4b312e98ddd845f900bf3dc17d89954e2fc0693d35a363_amd64"
},
"product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:9782b38d317f3bd46c4b312e98ddd845f900bf3dc17d89954e2fc0693d35a363_amd64",
"relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:a4e92b34cc470c81c2bdf31e7e1c0a14cc1ed50947ebadf27cfc29bbe632cc11_s390x as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:a4e92b34cc470c81c2bdf31e7e1c0a14cc1ed50947ebadf27cfc29bbe632cc11_s390x"
},
"product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:a4e92b34cc470c81c2bdf31e7e1c0a14cc1ed50947ebadf27cfc29bbe632cc11_s390x",
"relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:efa869209e9675e3dcc1ae35f6fd59218f36573dbb87467be82123c625270573_ppc64le as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1.0",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:efa869209e9675e3dcc1ae35f6fd59218f36573dbb87467be82123c625270573_ppc64le"
},
"product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:efa869209e9675e3dcc1ae35f6fd59218f36573dbb87467be82123c625270573_ppc64le",
"relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:215ffb659953b515a6ae4e4162bb641eaa0d7dd548a0d8487b8bce0cc77e07d3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:8e161ba88509d7757f7984f59638a55826d8cbb5985f42b07a139e7d2010934a_arm64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:9782b38d317f3bd46c4b312e98ddd845f900bf3dc17d89954e2fc0693d35a363_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:a4e92b34cc470c81c2bdf31e7e1c0a14cc1ed50947ebadf27cfc29bbe632cc11_s390x",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:efa869209e9675e3dcc1ae35f6fd59218f36573dbb87467be82123c625270573_ppc64le"
],
"known_not_affected": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:215ffb659953b515a6ae4e4162bb641eaa0d7dd548a0d8487b8bce0cc77e07d3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T22:10:05+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:8e161ba88509d7757f7984f59638a55826d8cbb5985f42b07a139e7d2010934a_arm64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:9782b38d317f3bd46c4b312e98ddd845f900bf3dc17d89954e2fc0693d35a363_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:a4e92b34cc470c81c2bdf31e7e1c0a14cc1ed50947ebadf27cfc29bbe632cc11_s390x",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:efa869209e9675e3dcc1ae35f6fd59218f36573dbb87467be82123c625270573_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2201"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:215ffb659953b515a6ae4e4162bb641eaa0d7dd548a0d8487b8bce0cc77e07d3_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:8e161ba88509d7757f7984f59638a55826d8cbb5985f42b07a139e7d2010934a_arm64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:9782b38d317f3bd46c4b312e98ddd845f900bf3dc17d89954e2fc0693d35a363_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:a4e92b34cc470c81c2bdf31e7e1c0a14cc1ed50947ebadf27cfc29bbe632cc11_s390x",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1.0:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:efa869209e9675e3dcc1ae35f6fd59218f36573dbb87467be82123c625270573_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2133
Vulnerability from csaf_redhat - Published: 2026-02-05 15:02 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The 1.3.2 release of Red Hat Trusted Artifact Signer OpenShift Operator.\nFor more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"title": "Topic"
},
{
"category": "general",
"text": "The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, and 4.20",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2133",
"url": "https://access.redhat.com/errata/RHSA-2026:2133"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2133.json"
}
],
"title": "Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release",
"tracking": {
"current_release_date": "2026-02-11T08:53:11+00:00",
"generator": {
"date": "2026-02-11T08:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2133",
"initial_release_date": "2026-02-05T15:02:51+00:00",
"revision_history": [
{
"date": "2026-02-05T15:02:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T15:03:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Trusted Artifact Signer 1.3",
"product": {
"name": "Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:trusted_artifact_signer:1.3::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Trusted Artifact Signer"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/createtree-rhel9@sha256:e8f95dc51266292cc1909ee11ba97c8e8e112af063b257814fe66f1a3894d267_amd64",
"product": {
"name": "registry.redhat.io/rhtas/createtree-rhel9@sha256:e8f95dc51266292cc1909ee11ba97c8e8e112af063b257814fe66f1a3894d267_amd64",
"product_id": "registry.redhat.io/rhtas/createtree-rhel9@sha256:e8f95dc51266292cc1909ee11ba97c8e8e112af063b257814fe66f1a3894d267_amd64",
"product_identification_helper": {
"purl": "pkg:oci/createtree-rhel9@sha256%3Ae8f95dc51266292cc1909ee11ba97c8e8e112af063b257814fe66f1a3894d267?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770106156"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/createtree-rhel9@sha256:e8f95dc51266292cc1909ee11ba97c8e8e112af063b257814fe66f1a3894d267_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/createtree-rhel9@sha256:e8f95dc51266292cc1909ee11ba97c8e8e112af063b257814fe66f1a3894d267_amd64"
},
"product_reference": "registry.redhat.io/rhtas/createtree-rhel9@sha256:e8f95dc51266292cc1909ee11ba97c8e8e112af063b257814fe66f1a3894d267_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/createtree-rhel9@sha256:e8f95dc51266292cc1909ee11ba97c8e8e112af063b257814fe66f1a3894d267_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:02:51+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/createtree-rhel9@sha256:e8f95dc51266292cc1909ee11ba97c8e8e112af063b257814fe66f1a3894d267_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2133"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/createtree-rhel9@sha256:e8f95dc51266292cc1909ee11ba97c8e8e112af063b257814fe66f1a3894d267_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2367
Vulnerability from csaf_redhat - Published: 2026-02-09 18:49 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Web Terminal Operator 1.11.1 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "The Web Terminal provides a way to access a fully in-browser terminal emulator within the OpenShift Console. Command-line tools for interacting with the OpenShift cluster are pre-installed.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2367",
"url": "https://access.redhat.com/errata/RHSA-2026:2367"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2367.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Web Terminal Operator 1.11.1 release.",
"tracking": {
"current_release_date": "2026-02-11T08:53:18+00:00",
"generator": {
"date": "2026-02-11T08:53:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2367",
"initial_release_date": "2026-02-09T18:49:52+00:00",
"revision_history": [
{
"date": "2026-02-09T18:49:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T18:50:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Web Terminal 1.11",
"product": {
"name": "Red Hat Web Terminal 1.11",
"product_id": "Red Hat Web Terminal 1.11",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:webterminal:1.11::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Web Terminal"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:b04fefd5457fbd60e0c9931938e6756313867c9e806893685413fdc2a2a15a97_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:b04fefd5457fbd60e0c9931938e6756313867c9e806893685413fdc2a2a15a97_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:b04fefd5457fbd60e0c9931938e6756313867c9e806893685413fdc2a2a15a97_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-exec-rhel9@sha256%3Ab04fefd5457fbd60e0c9931938e6756313867c9e806893685413fdc2a2a15a97?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770651177"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:268530ad61edfeb12d6c971fd65567ce3a95001c470543d46ebf9500494072ff_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:268530ad61edfeb12d6c971fd65567ce3a95001c470543d46ebf9500494072ff_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:268530ad61edfeb12d6c971fd65567ce3a95001c470543d46ebf9500494072ff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-rhel9-operator@sha256%3A268530ad61edfeb12d6c971fd65567ce3a95001c470543d46ebf9500494072ff?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770651174"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f09114a0c6f50de4f1faf7cd42d1425b444875f15e68ca5d9951f71bd7e8401c_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f09114a0c6f50de4f1faf7cd42d1425b444875f15e68ca5d9951f71bd7e8401c_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f09114a0c6f50de4f1faf7cd42d1425b444875f15e68ca5d9951f71bd7e8401c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-operator-bundle@sha256%3Af09114a0c6f50de4f1faf7cd42d1425b444875f15e68ca5d9951f71bd7e8401c?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770651128"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:760a6a3e5cf0b5207998ce39e12c240b2b30d459b4f929668672c2e3a771f6fe_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:760a6a3e5cf0b5207998ce39e12c240b2b30d459b4f929668672c2e3a771f6fe_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:760a6a3e5cf0b5207998ce39e12c240b2b30d459b4f929668672c2e3a771f6fe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-tooling-rhel9@sha256%3A760a6a3e5cf0b5207998ce39e12c240b2b30d459b4f929668672c2e3a771f6fe?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770511064"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:b04fefd5457fbd60e0c9931938e6756313867c9e806893685413fdc2a2a15a97_amd64 as a component of Red Hat Web Terminal 1.11",
"product_id": "Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:b04fefd5457fbd60e0c9931938e6756313867c9e806893685413fdc2a2a15a97_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:b04fefd5457fbd60e0c9931938e6756313867c9e806893685413fdc2a2a15a97_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f09114a0c6f50de4f1faf7cd42d1425b444875f15e68ca5d9951f71bd7e8401c_amd64 as a component of Red Hat Web Terminal 1.11",
"product_id": "Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f09114a0c6f50de4f1faf7cd42d1425b444875f15e68ca5d9951f71bd7e8401c_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f09114a0c6f50de4f1faf7cd42d1425b444875f15e68ca5d9951f71bd7e8401c_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:268530ad61edfeb12d6c971fd65567ce3a95001c470543d46ebf9500494072ff_amd64 as a component of Red Hat Web Terminal 1.11",
"product_id": "Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:268530ad61edfeb12d6c971fd65567ce3a95001c470543d46ebf9500494072ff_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:268530ad61edfeb12d6c971fd65567ce3a95001c470543d46ebf9500494072ff_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:760a6a3e5cf0b5207998ce39e12c240b2b30d459b4f929668672c2e3a771f6fe_amd64 as a component of Red Hat Web Terminal 1.11",
"product_id": "Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:760a6a3e5cf0b5207998ce39e12c240b2b30d459b4f929668672c2e3a771f6fe_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:760a6a3e5cf0b5207998ce39e12c240b2b30d459b4f929668672c2e3a771f6fe_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.11"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f09114a0c6f50de4f1faf7cd42d1425b444875f15e68ca5d9951f71bd7e8401c_amd64",
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:268530ad61edfeb12d6c971fd65567ce3a95001c470543d46ebf9500494072ff_amd64",
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:760a6a3e5cf0b5207998ce39e12c240b2b30d459b4f929668672c2e3a771f6fe_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:b04fefd5457fbd60e0c9931938e6756313867c9e806893685413fdc2a2a15a97_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f09114a0c6f50de4f1faf7cd42d1425b444875f15e68ca5d9951f71bd7e8401c_amd64",
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:268530ad61edfeb12d6c971fd65567ce3a95001c470543d46ebf9500494072ff_amd64",
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:760a6a3e5cf0b5207998ce39e12c240b2b30d459b4f929668672c2e3a771f6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T18:49:52+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.16 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:b04fefd5457fbd60e0c9931938e6756313867c9e806893685413fdc2a2a15a97_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2367"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:b04fefd5457fbd60e0c9931938e6756313867c9e806893685413fdc2a2a15a97_amd64",
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f09114a0c6f50de4f1faf7cd42d1425b444875f15e68ca5d9951f71bd7e8401c_amd64",
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:268530ad61edfeb12d6c971fd65567ce3a95001c470543d46ebf9500494072ff_amd64",
"Red Hat Web Terminal 1.11:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:760a6a3e5cf0b5207998ce39e12c240b2b30d459b4f929668672c2e3a771f6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1938
Vulnerability from csaf_redhat - Published: 2026-02-04 15:12 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Builds 1.7.0",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Builds 1.7.0",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1938",
"url": "https://access.redhat.com/errata/RHSA-2026:1938"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1938.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.0",
"tracking": {
"current_release_date": "2026-02-11T08:53:08+00:00",
"generator": {
"date": "2026-02-11T08:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1938",
"initial_release_date": "2026-02-04T15:12:01+00:00",
"revision_history": [
{
"date": "2026-02-04T15:12:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-04T15:12:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Builds for Red Hat OpenShift 1.7.0",
"product": {
"name": "Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_builds:1.7::el9"
}
}
}
],
"category": "product_family",
"name": "Builds for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b068930131628662669b1d8d9cfd24afb55c5ebe2bb607369bb0b5194e75dda_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b068930131628662669b1d8d9cfd24afb55c5ebe2bb607369bb0b5194e75dda_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b068930131628662669b1d8d9cfd24afb55c5ebe2bb607369bb0b5194e75dda_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A7b068930131628662669b1d8d9cfd24afb55c5ebe2bb607369bb0b5194e75dda?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b85a8af2cad841584c2a283827a39cea0cf59ef9cffa214f6972253f6138e456_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b85a8af2cad841584c2a283827a39cea0cf59ef9cffa214f6972253f6138e456_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b85a8af2cad841584c2a283827a39cea0cf59ef9cffa214f6972253f6138e456_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Ab85a8af2cad841584c2a283827a39cea0cf59ef9cffa214f6972253f6138e456?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:80cad11b631b7aeb92ef3d0b82d3014a65a9bf4301760d72327d95a6e02c726f_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:80cad11b631b7aeb92ef3d0b82d3014a65a9bf4301760d72327d95a6e02c726f_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:80cad11b631b7aeb92ef3d0b82d3014a65a9bf4301760d72327d95a6e02c726f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A80cad11b631b7aeb92ef3d0b82d3014a65a9bf4301760d72327d95a6e02c726f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:4fd65f99ebe2ba3d40678c7837364dc7dbd482c551673d161761f720e5319c05_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:4fd65f99ebe2ba3d40678c7837364dc7dbd482c551673d161761f720e5319c05_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:4fd65f99ebe2ba3d40678c7837364dc7dbd482c551673d161761f720e5319c05_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A4fd65f99ebe2ba3d40678c7837364dc7dbd482c551673d161761f720e5319c05?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f244453dd2178ccb3599df966f5c5107892003265fbe91989ba4420fa868a706_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f244453dd2178ccb3599df966f5c5107892003265fbe91989ba4420fa868a706_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f244453dd2178ccb3599df966f5c5107892003265fbe91989ba4420fa868a706_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Af244453dd2178ccb3599df966f5c5107892003265fbe91989ba4420fa868a706?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769693921"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:ec64bb8be274454c0854dac68ddfac2cf3ab1650fd7e6cfdcda95b0f98f07b66_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:ec64bb8be274454c0854dac68ddfac2cf3ab1650fd7e6cfdcda95b0f98f07b66_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:ec64bb8be274454c0854dac68ddfac2cf3ab1650fd7e6cfdcda95b0f98f07b66_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-operator-bundle@sha256%3Aec64bb8be274454c0854dac68ddfac2cf3ab1650fd7e6cfdcda95b0f98f07b66?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1770212974"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:9c992a428197cbbc762c72c1d46d6ecd50eb97f721062d095981d599341209e0_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:9c992a428197cbbc762c72c1d46d6ecd50eb97f721062d095981d599341209e0_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:9c992a428197cbbc762c72c1d46d6ecd50eb97f721062d095981d599341209e0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A9c992a428197cbbc762c72c1d46d6ecd50eb97f721062d095981d599341209e0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769599767"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9bea2f5fa07a04997ffd8e18ffd9bfd412af320369daad0518e24dcf859798a6_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9bea2f5fa07a04997ffd8e18ffd9bfd412af320369daad0518e24dcf859798a6_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9bea2f5fa07a04997ffd8e18ffd9bfd412af320369daad0518e24dcf859798a6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A9bea2f5fa07a04997ffd8e18ffd9bfd412af320369daad0518e24dcf859798a6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769599762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2d6f4a64ec49640831b3069abbc9bd2204d9a300726908a6675073b0a97dfd5c_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2d6f4a64ec49640831b3069abbc9bd2204d9a300726908a6675073b0a97dfd5c_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2d6f4a64ec49640831b3069abbc9bd2204d9a300726908a6675073b0a97dfd5c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A2d6f4a64ec49640831b3069abbc9bd2204d9a300726908a6675073b0a97dfd5c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685563"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:da6096a3652765dc0f6d36cd3a643413575f622116b7f6258df3b05eca98adb6_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:da6096a3652765dc0f6d36cd3a643413575f622116b7f6258df3b05eca98adb6_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:da6096a3652765dc0f6d36cd3a643413575f622116b7f6258df3b05eca98adb6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Ada6096a3652765dc0f6d36cd3a643413575f622116b7f6258df3b05eca98adb6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685740"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5a91979142045ec29c62fa5b0fc5da5c429f030bb9637a4519929cb7939da6a7_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5a91979142045ec29c62fa5b0fc5da5c429f030bb9637a4519929cb7939da6a7_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5a91979142045ec29c62fa5b0fc5da5c429f030bb9637a4519929cb7939da6a7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A5a91979142045ec29c62fa5b0fc5da5c429f030bb9637a4519929cb7939da6a7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a0e4fd71af27314a8459d00ced0c1295be9771e3000a4bf3aa5ab2881ae7c1a6_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a0e4fd71af27314a8459d00ced0c1295be9771e3000a4bf3aa5ab2881ae7c1a6_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a0e4fd71af27314a8459d00ced0c1295be9771e3000a4bf3aa5ab2881ae7c1a6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Aa0e4fd71af27314a8459d00ced0c1295be9771e3000a4bf3aa5ab2881ae7c1a6?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:2fe055109b2edf1910d408acf6ac01ef24e0db1c2aecd83e858110eb235ccad9_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:2fe055109b2edf1910d408acf6ac01ef24e0db1c2aecd83e858110eb235ccad9_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:2fe055109b2edf1910d408acf6ac01ef24e0db1c2aecd83e858110eb235ccad9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A2fe055109b2edf1910d408acf6ac01ef24e0db1c2aecd83e858110eb235ccad9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9d0f077f8aff77644e66992ededc9948c7351b7f78859a1016b184073452b613_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9d0f077f8aff77644e66992ededc9948c7351b7f78859a1016b184073452b613_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9d0f077f8aff77644e66992ededc9948c7351b7f78859a1016b184073452b613_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A9d0f077f8aff77644e66992ededc9948c7351b7f78859a1016b184073452b613?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e68464e70c7947879aeefa73e78a797c59c7a1d9442e571849eb8b5e6e4fb41d_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e68464e70c7947879aeefa73e78a797c59c7a1d9442e571849eb8b5e6e4fb41d_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e68464e70c7947879aeefa73e78a797c59c7a1d9442e571849eb8b5e6e4fb41d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Ae68464e70c7947879aeefa73e78a797c59c7a1d9442e571849eb8b5e6e4fb41d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769693921"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:20c0ef9d1bb1b7cd0a1deb217ed800fba03f63e68cf355afc1700d45bc921d7e_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:20c0ef9d1bb1b7cd0a1deb217ed800fba03f63e68cf355afc1700d45bc921d7e_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:20c0ef9d1bb1b7cd0a1deb217ed800fba03f63e68cf355afc1700d45bc921d7e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A20c0ef9d1bb1b7cd0a1deb217ed800fba03f63e68cf355afc1700d45bc921d7e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769599767"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:acd08505de171d725be119bd4c5c9216d836896797aab9bafa009a6b52758e97_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:acd08505de171d725be119bd4c5c9216d836896797aab9bafa009a6b52758e97_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:acd08505de171d725be119bd4c5c9216d836896797aab9bafa009a6b52758e97_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Aacd08505de171d725be119bd4c5c9216d836896797aab9bafa009a6b52758e97?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769599762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a60074adf798d15093a41717b73dd7cdbcc95314d503ea411b34d7d6028ce26c_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a60074adf798d15093a41717b73dd7cdbcc95314d503ea411b34d7d6028ce26c_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a60074adf798d15093a41717b73dd7cdbcc95314d503ea411b34d7d6028ce26c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Aa60074adf798d15093a41717b73dd7cdbcc95314d503ea411b34d7d6028ce26c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685563"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:beb189933e13703d2a1c380f5fa3199b217ba81c1b4588e03a4af9da8006925c_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:beb189933e13703d2a1c380f5fa3199b217ba81c1b4588e03a4af9da8006925c_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:beb189933e13703d2a1c380f5fa3199b217ba81c1b4588e03a4af9da8006925c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Abeb189933e13703d2a1c380f5fa3199b217ba81c1b4588e03a4af9da8006925c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685740"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:af2385783168ea28f359a0db7e9190268b37b4f249271b59299ec518efd76341_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:af2385783168ea28f359a0db7e9190268b37b4f249271b59299ec518efd76341_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:af2385783168ea28f359a0db7e9190268b37b4f249271b59299ec518efd76341_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3Aaf2385783168ea28f359a0db7e9190268b37b4f249271b59299ec518efd76341?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ad386674c8a9223616a1b09e33ad0c9bbf3f8ee2c885d3ad9d3c7188023f7076_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ad386674c8a9223616a1b09e33ad0c9bbf3f8ee2c885d3ad9d3c7188023f7076_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ad386674c8a9223616a1b09e33ad0c9bbf3f8ee2c885d3ad9d3c7188023f7076_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Aad386674c8a9223616a1b09e33ad0c9bbf3f8ee2c885d3ad9d3c7188023f7076?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:5d1a89a16f5f009ff4908c3456810c757c8855afa39902d7e9cba0c4bc34ea06_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:5d1a89a16f5f009ff4908c3456810c757c8855afa39902d7e9cba0c4bc34ea06_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:5d1a89a16f5f009ff4908c3456810c757c8855afa39902d7e9cba0c4bc34ea06_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A5d1a89a16f5f009ff4908c3456810c757c8855afa39902d7e9cba0c4bc34ea06?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:418d08c8d29b17aa1d75bbb0cf0df7160de721796c1ac72712708c2af9b4f2d6_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:418d08c8d29b17aa1d75bbb0cf0df7160de721796c1ac72712708c2af9b4f2d6_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:418d08c8d29b17aa1d75bbb0cf0df7160de721796c1ac72712708c2af9b4f2d6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A418d08c8d29b17aa1d75bbb0cf0df7160de721796c1ac72712708c2af9b4f2d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0471d2271b97ec831bdca77d583ebca0ffd14b10bb20d6ff3c38d69d5ccf573_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0471d2271b97ec831bdca77d583ebca0ffd14b10bb20d6ff3c38d69d5ccf573_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0471d2271b97ec831bdca77d583ebca0ffd14b10bb20d6ff3c38d69d5ccf573_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Ab0471d2271b97ec831bdca77d583ebca0ffd14b10bb20d6ff3c38d69d5ccf573?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769693921"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:2400f72a39fa2427fcfc063b0446906a84f5eafcdf625a0d11417cb78b1cbdbf_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:2400f72a39fa2427fcfc063b0446906a84f5eafcdf625a0d11417cb78b1cbdbf_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:2400f72a39fa2427fcfc063b0446906a84f5eafcdf625a0d11417cb78b1cbdbf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A2400f72a39fa2427fcfc063b0446906a84f5eafcdf625a0d11417cb78b1cbdbf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769599767"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:963d2459b057554c95bf686be1e851ec17e689484694bbf58408c363ea47e372_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:963d2459b057554c95bf686be1e851ec17e689484694bbf58408c363ea47e372_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:963d2459b057554c95bf686be1e851ec17e689484694bbf58408c363ea47e372_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A963d2459b057554c95bf686be1e851ec17e689484694bbf58408c363ea47e372?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769599762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:023336ed53784826511848f791e321d02904c451f4abfe7d00ef51054270ea4d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:023336ed53784826511848f791e321d02904c451f4abfe7d00ef51054270ea4d_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:023336ed53784826511848f791e321d02904c451f4abfe7d00ef51054270ea4d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A023336ed53784826511848f791e321d02904c451f4abfe7d00ef51054270ea4d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685563"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b7357fea04ae79da416bcb41ace643795b17ba1a424f5208f4014cb946c7b96_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b7357fea04ae79da416bcb41ace643795b17ba1a424f5208f4014cb946c7b96_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b7357fea04ae79da416bcb41ace643795b17ba1a424f5208f4014cb946c7b96_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A0b7357fea04ae79da416bcb41ace643795b17ba1a424f5208f4014cb946c7b96?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685740"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:ef21ec8d62180cfd85a1d79cb21171e751b7a26faaeba6c9d7fd3fbe4ebd486a_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:ef21ec8d62180cfd85a1d79cb21171e751b7a26faaeba6c9d7fd3fbe4ebd486a_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:ef21ec8d62180cfd85a1d79cb21171e751b7a26faaeba6c9d7fd3fbe4ebd486a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3Aef21ec8d62180cfd85a1d79cb21171e751b7a26faaeba6c9d7fd3fbe4ebd486a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:270c8a89aeed36b4d3b274adb30c9c665e8c6ee8153b0064a09b7c385f9b8621_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:270c8a89aeed36b4d3b274adb30c9c665e8c6ee8153b0064a09b7c385f9b8621_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:270c8a89aeed36b4d3b274adb30c9c665e8c6ee8153b0064a09b7c385f9b8621_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A270c8a89aeed36b4d3b274adb30c9c665e8c6ee8153b0064a09b7c385f9b8621?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:25b7aae296854a42d5594b43969002a0ab3da401fe3c46ab0fd056a250830007_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:25b7aae296854a42d5594b43969002a0ab3da401fe3c46ab0fd056a250830007_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:25b7aae296854a42d5594b43969002a0ab3da401fe3c46ab0fd056a250830007_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A25b7aae296854a42d5594b43969002a0ab3da401fe3c46ab0fd056a250830007?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:8727ef2c0b328dc2e9b4b158d48bd7e4f7350373f89e57e8ccfa62d9fbd7b668_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:8727ef2c0b328dc2e9b4b158d48bd7e4f7350373f89e57e8ccfa62d9fbd7b668_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:8727ef2c0b328dc2e9b4b158d48bd7e4f7350373f89e57e8ccfa62d9fbd7b668_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A8727ef2c0b328dc2e9b4b158d48bd7e4f7350373f89e57e8ccfa62d9fbd7b668?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685557"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f33a2ff3cd1cbeb3c3404edb33314f6b59d8d3f7dda6b3b870ab9f3e545d8143_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f33a2ff3cd1cbeb3c3404edb33314f6b59d8d3f7dda6b3b870ab9f3e545d8143_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f33a2ff3cd1cbeb3c3404edb33314f6b59d8d3f7dda6b3b870ab9f3e545d8143_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Af33a2ff3cd1cbeb3c3404edb33314f6b59d8d3f7dda6b3b870ab9f3e545d8143?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769693921"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:bdb4d0454e366a0a4554946444a8665ed4b195396d7ac923f7b5441966634796_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:bdb4d0454e366a0a4554946444a8665ed4b195396d7ac923f7b5441966634796_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:bdb4d0454e366a0a4554946444a8665ed4b195396d7ac923f7b5441966634796_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Abdb4d0454e366a0a4554946444a8665ed4b195396d7ac923f7b5441966634796?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769599767"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e36382a6869b97ccc40a9d750728d110a343330c5130e2ac5a9d510ba6104b84_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e36382a6869b97ccc40a9d750728d110a343330c5130e2ac5a9d510ba6104b84_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e36382a6869b97ccc40a9d750728d110a343330c5130e2ac5a9d510ba6104b84_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ae36382a6869b97ccc40a9d750728d110a343330c5130e2ac5a9d510ba6104b84?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769599762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:76da3554d23f9928a94c99e93f3a6cf9bfc95e2a96040fa310653bf77301cb93_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:76da3554d23f9928a94c99e93f3a6cf9bfc95e2a96040fa310653bf77301cb93_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:76da3554d23f9928a94c99e93f3a6cf9bfc95e2a96040fa310653bf77301cb93_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A76da3554d23f9928a94c99e93f3a6cf9bfc95e2a96040fa310653bf77301cb93?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685563"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e4530364cfa302bcff1ec17bc3989f7df5c80f8f3a27f77427043c7e120ff282_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e4530364cfa302bcff1ec17bc3989f7df5c80f8f3a27f77427043c7e120ff282_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e4530364cfa302bcff1ec17bc3989f7df5c80f8f3a27f77427043c7e120ff282_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Ae4530364cfa302bcff1ec17bc3989f7df5c80f8f3a27f77427043c7e120ff282?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769685740"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5a91979142045ec29c62fa5b0fc5da5c429f030bb9637a4519929cb7939da6a7_arm64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5a91979142045ec29c62fa5b0fc5da5c429f030bb9637a4519929cb7939da6a7_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5a91979142045ec29c62fa5b0fc5da5c429f030bb9637a4519929cb7939da6a7_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b068930131628662669b1d8d9cfd24afb55c5ebe2bb607369bb0b5194e75dda_amd64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b068930131628662669b1d8d9cfd24afb55c5ebe2bb607369bb0b5194e75dda_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b068930131628662669b1d8d9cfd24afb55c5ebe2bb607369bb0b5194e75dda_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:af2385783168ea28f359a0db7e9190268b37b4f249271b59299ec518efd76341_ppc64le as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:af2385783168ea28f359a0db7e9190268b37b4f249271b59299ec518efd76341_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:af2385783168ea28f359a0db7e9190268b37b4f249271b59299ec518efd76341_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:ef21ec8d62180cfd85a1d79cb21171e751b7a26faaeba6c9d7fd3fbe4ebd486a_s390x as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:ef21ec8d62180cfd85a1d79cb21171e751b7a26faaeba6c9d7fd3fbe4ebd486a_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:ef21ec8d62180cfd85a1d79cb21171e751b7a26faaeba6c9d7fd3fbe4ebd486a_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:270c8a89aeed36b4d3b274adb30c9c665e8c6ee8153b0064a09b7c385f9b8621_s390x as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:270c8a89aeed36b4d3b274adb30c9c665e8c6ee8153b0064a09b7c385f9b8621_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:270c8a89aeed36b4d3b274adb30c9c665e8c6ee8153b0064a09b7c385f9b8621_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a0e4fd71af27314a8459d00ced0c1295be9771e3000a4bf3aa5ab2881ae7c1a6_arm64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a0e4fd71af27314a8459d00ced0c1295be9771e3000a4bf3aa5ab2881ae7c1a6_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a0e4fd71af27314a8459d00ced0c1295be9771e3000a4bf3aa5ab2881ae7c1a6_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ad386674c8a9223616a1b09e33ad0c9bbf3f8ee2c885d3ad9d3c7188023f7076_ppc64le as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ad386674c8a9223616a1b09e33ad0c9bbf3f8ee2c885d3ad9d3c7188023f7076_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ad386674c8a9223616a1b09e33ad0c9bbf3f8ee2c885d3ad9d3c7188023f7076_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b85a8af2cad841584c2a283827a39cea0cf59ef9cffa214f6972253f6138e456_amd64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b85a8af2cad841584c2a283827a39cea0cf59ef9cffa214f6972253f6138e456_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b85a8af2cad841584c2a283827a39cea0cf59ef9cffa214f6972253f6138e456_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:25b7aae296854a42d5594b43969002a0ab3da401fe3c46ab0fd056a250830007_s390x as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:25b7aae296854a42d5594b43969002a0ab3da401fe3c46ab0fd056a250830007_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:25b7aae296854a42d5594b43969002a0ab3da401fe3c46ab0fd056a250830007_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:2fe055109b2edf1910d408acf6ac01ef24e0db1c2aecd83e858110eb235ccad9_arm64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:2fe055109b2edf1910d408acf6ac01ef24e0db1c2aecd83e858110eb235ccad9_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:2fe055109b2edf1910d408acf6ac01ef24e0db1c2aecd83e858110eb235ccad9_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:5d1a89a16f5f009ff4908c3456810c757c8855afa39902d7e9cba0c4bc34ea06_ppc64le as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:5d1a89a16f5f009ff4908c3456810c757c8855afa39902d7e9cba0c4bc34ea06_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:5d1a89a16f5f009ff4908c3456810c757c8855afa39902d7e9cba0c4bc34ea06_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:80cad11b631b7aeb92ef3d0b82d3014a65a9bf4301760d72327d95a6e02c726f_amd64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:80cad11b631b7aeb92ef3d0b82d3014a65a9bf4301760d72327d95a6e02c726f_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:80cad11b631b7aeb92ef3d0b82d3014a65a9bf4301760d72327d95a6e02c726f_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:418d08c8d29b17aa1d75bbb0cf0df7160de721796c1ac72712708c2af9b4f2d6_ppc64le as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:418d08c8d29b17aa1d75bbb0cf0df7160de721796c1ac72712708c2af9b4f2d6_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:418d08c8d29b17aa1d75bbb0cf0df7160de721796c1ac72712708c2af9b4f2d6_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:4fd65f99ebe2ba3d40678c7837364dc7dbd482c551673d161761f720e5319c05_amd64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:4fd65f99ebe2ba3d40678c7837364dc7dbd482c551673d161761f720e5319c05_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:4fd65f99ebe2ba3d40678c7837364dc7dbd482c551673d161761f720e5319c05_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:8727ef2c0b328dc2e9b4b158d48bd7e4f7350373f89e57e8ccfa62d9fbd7b668_s390x as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:8727ef2c0b328dc2e9b4b158d48bd7e4f7350373f89e57e8ccfa62d9fbd7b668_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:8727ef2c0b328dc2e9b4b158d48bd7e4f7350373f89e57e8ccfa62d9fbd7b668_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9d0f077f8aff77644e66992ededc9948c7351b7f78859a1016b184073452b613_arm64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9d0f077f8aff77644e66992ededc9948c7351b7f78859a1016b184073452b613_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9d0f077f8aff77644e66992ededc9948c7351b7f78859a1016b184073452b613_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:ec64bb8be274454c0854dac68ddfac2cf3ab1650fd7e6cfdcda95b0f98f07b66_amd64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:ec64bb8be274454c0854dac68ddfac2cf3ab1650fd7e6cfdcda95b0f98f07b66_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:ec64bb8be274454c0854dac68ddfac2cf3ab1650fd7e6cfdcda95b0f98f07b66_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0471d2271b97ec831bdca77d583ebca0ffd14b10bb20d6ff3c38d69d5ccf573_ppc64le as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0471d2271b97ec831bdca77d583ebca0ffd14b10bb20d6ff3c38d69d5ccf573_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0471d2271b97ec831bdca77d583ebca0ffd14b10bb20d6ff3c38d69d5ccf573_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e68464e70c7947879aeefa73e78a797c59c7a1d9442e571849eb8b5e6e4fb41d_arm64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e68464e70c7947879aeefa73e78a797c59c7a1d9442e571849eb8b5e6e4fb41d_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e68464e70c7947879aeefa73e78a797c59c7a1d9442e571849eb8b5e6e4fb41d_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f244453dd2178ccb3599df966f5c5107892003265fbe91989ba4420fa868a706_amd64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f244453dd2178ccb3599df966f5c5107892003265fbe91989ba4420fa868a706_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f244453dd2178ccb3599df966f5c5107892003265fbe91989ba4420fa868a706_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f33a2ff3cd1cbeb3c3404edb33314f6b59d8d3f7dda6b3b870ab9f3e545d8143_s390x as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f33a2ff3cd1cbeb3c3404edb33314f6b59d8d3f7dda6b3b870ab9f3e545d8143_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f33a2ff3cd1cbeb3c3404edb33314f6b59d8d3f7dda6b3b870ab9f3e545d8143_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:20c0ef9d1bb1b7cd0a1deb217ed800fba03f63e68cf355afc1700d45bc921d7e_arm64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:20c0ef9d1bb1b7cd0a1deb217ed800fba03f63e68cf355afc1700d45bc921d7e_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:20c0ef9d1bb1b7cd0a1deb217ed800fba03f63e68cf355afc1700d45bc921d7e_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:2400f72a39fa2427fcfc063b0446906a84f5eafcdf625a0d11417cb78b1cbdbf_ppc64le as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:2400f72a39fa2427fcfc063b0446906a84f5eafcdf625a0d11417cb78b1cbdbf_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:2400f72a39fa2427fcfc063b0446906a84f5eafcdf625a0d11417cb78b1cbdbf_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:9c992a428197cbbc762c72c1d46d6ecd50eb97f721062d095981d599341209e0_amd64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:9c992a428197cbbc762c72c1d46d6ecd50eb97f721062d095981d599341209e0_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:9c992a428197cbbc762c72c1d46d6ecd50eb97f721062d095981d599341209e0_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:bdb4d0454e366a0a4554946444a8665ed4b195396d7ac923f7b5441966634796_s390x as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:bdb4d0454e366a0a4554946444a8665ed4b195396d7ac923f7b5441966634796_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:bdb4d0454e366a0a4554946444a8665ed4b195396d7ac923f7b5441966634796_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:963d2459b057554c95bf686be1e851ec17e689484694bbf58408c363ea47e372_ppc64le as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:963d2459b057554c95bf686be1e851ec17e689484694bbf58408c363ea47e372_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:963d2459b057554c95bf686be1e851ec17e689484694bbf58408c363ea47e372_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9bea2f5fa07a04997ffd8e18ffd9bfd412af320369daad0518e24dcf859798a6_amd64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9bea2f5fa07a04997ffd8e18ffd9bfd412af320369daad0518e24dcf859798a6_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9bea2f5fa07a04997ffd8e18ffd9bfd412af320369daad0518e24dcf859798a6_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:acd08505de171d725be119bd4c5c9216d836896797aab9bafa009a6b52758e97_arm64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:acd08505de171d725be119bd4c5c9216d836896797aab9bafa009a6b52758e97_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:acd08505de171d725be119bd4c5c9216d836896797aab9bafa009a6b52758e97_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e36382a6869b97ccc40a9d750728d110a343330c5130e2ac5a9d510ba6104b84_s390x as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e36382a6869b97ccc40a9d750728d110a343330c5130e2ac5a9d510ba6104b84_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e36382a6869b97ccc40a9d750728d110a343330c5130e2ac5a9d510ba6104b84_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:023336ed53784826511848f791e321d02904c451f4abfe7d00ef51054270ea4d_ppc64le as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:023336ed53784826511848f791e321d02904c451f4abfe7d00ef51054270ea4d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:023336ed53784826511848f791e321d02904c451f4abfe7d00ef51054270ea4d_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2d6f4a64ec49640831b3069abbc9bd2204d9a300726908a6675073b0a97dfd5c_amd64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2d6f4a64ec49640831b3069abbc9bd2204d9a300726908a6675073b0a97dfd5c_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2d6f4a64ec49640831b3069abbc9bd2204d9a300726908a6675073b0a97dfd5c_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:76da3554d23f9928a94c99e93f3a6cf9bfc95e2a96040fa310653bf77301cb93_s390x as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:76da3554d23f9928a94c99e93f3a6cf9bfc95e2a96040fa310653bf77301cb93_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:76da3554d23f9928a94c99e93f3a6cf9bfc95e2a96040fa310653bf77301cb93_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a60074adf798d15093a41717b73dd7cdbcc95314d503ea411b34d7d6028ce26c_arm64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a60074adf798d15093a41717b73dd7cdbcc95314d503ea411b34d7d6028ce26c_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a60074adf798d15093a41717b73dd7cdbcc95314d503ea411b34d7d6028ce26c_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b7357fea04ae79da416bcb41ace643795b17ba1a424f5208f4014cb946c7b96_ppc64le as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b7357fea04ae79da416bcb41ace643795b17ba1a424f5208f4014cb946c7b96_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b7357fea04ae79da416bcb41ace643795b17ba1a424f5208f4014cb946c7b96_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:beb189933e13703d2a1c380f5fa3199b217ba81c1b4588e03a4af9da8006925c_arm64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:beb189933e13703d2a1c380f5fa3199b217ba81c1b4588e03a4af9da8006925c_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:beb189933e13703d2a1c380f5fa3199b217ba81c1b4588e03a4af9da8006925c_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:da6096a3652765dc0f6d36cd3a643413575f622116b7f6258df3b05eca98adb6_amd64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:da6096a3652765dc0f6d36cd3a643413575f622116b7f6258df3b05eca98adb6_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:da6096a3652765dc0f6d36cd3a643413575f622116b7f6258df3b05eca98adb6_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e4530364cfa302bcff1ec17bc3989f7df5c80f8f3a27f77427043c7e120ff282_s390x as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e4530364cfa302bcff1ec17bc3989f7df5c80f8f3a27f77427043c7e120ff282_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e4530364cfa302bcff1ec17bc3989f7df5c80f8f3a27f77427043c7e120ff282_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:ec64bb8be274454c0854dac68ddfac2cf3ab1650fd7e6cfdcda95b0f98f07b66_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:20c0ef9d1bb1b7cd0a1deb217ed800fba03f63e68cf355afc1700d45bc921d7e_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:2400f72a39fa2427fcfc063b0446906a84f5eafcdf625a0d11417cb78b1cbdbf_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:9c992a428197cbbc762c72c1d46d6ecd50eb97f721062d095981d599341209e0_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:bdb4d0454e366a0a4554946444a8665ed4b195396d7ac923f7b5441966634796_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:963d2459b057554c95bf686be1e851ec17e689484694bbf58408c363ea47e372_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9bea2f5fa07a04997ffd8e18ffd9bfd412af320369daad0518e24dcf859798a6_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:acd08505de171d725be119bd4c5c9216d836896797aab9bafa009a6b52758e97_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e36382a6869b97ccc40a9d750728d110a343330c5130e2ac5a9d510ba6104b84_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5a91979142045ec29c62fa5b0fc5da5c429f030bb9637a4519929cb7939da6a7_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b068930131628662669b1d8d9cfd24afb55c5ebe2bb607369bb0b5194e75dda_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:af2385783168ea28f359a0db7e9190268b37b4f249271b59299ec518efd76341_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:ef21ec8d62180cfd85a1d79cb21171e751b7a26faaeba6c9d7fd3fbe4ebd486a_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:270c8a89aeed36b4d3b274adb30c9c665e8c6ee8153b0064a09b7c385f9b8621_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a0e4fd71af27314a8459d00ced0c1295be9771e3000a4bf3aa5ab2881ae7c1a6_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ad386674c8a9223616a1b09e33ad0c9bbf3f8ee2c885d3ad9d3c7188023f7076_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b85a8af2cad841584c2a283827a39cea0cf59ef9cffa214f6972253f6138e456_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:25b7aae296854a42d5594b43969002a0ab3da401fe3c46ab0fd056a250830007_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:2fe055109b2edf1910d408acf6ac01ef24e0db1c2aecd83e858110eb235ccad9_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:5d1a89a16f5f009ff4908c3456810c757c8855afa39902d7e9cba0c4bc34ea06_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:80cad11b631b7aeb92ef3d0b82d3014a65a9bf4301760d72327d95a6e02c726f_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:418d08c8d29b17aa1d75bbb0cf0df7160de721796c1ac72712708c2af9b4f2d6_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:4fd65f99ebe2ba3d40678c7837364dc7dbd482c551673d161761f720e5319c05_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:8727ef2c0b328dc2e9b4b158d48bd7e4f7350373f89e57e8ccfa62d9fbd7b668_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9d0f077f8aff77644e66992ededc9948c7351b7f78859a1016b184073452b613_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0471d2271b97ec831bdca77d583ebca0ffd14b10bb20d6ff3c38d69d5ccf573_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e68464e70c7947879aeefa73e78a797c59c7a1d9442e571849eb8b5e6e4fb41d_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f244453dd2178ccb3599df966f5c5107892003265fbe91989ba4420fa868a706_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f33a2ff3cd1cbeb3c3404edb33314f6b59d8d3f7dda6b3b870ab9f3e545d8143_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:023336ed53784826511848f791e321d02904c451f4abfe7d00ef51054270ea4d_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2d6f4a64ec49640831b3069abbc9bd2204d9a300726908a6675073b0a97dfd5c_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:76da3554d23f9928a94c99e93f3a6cf9bfc95e2a96040fa310653bf77301cb93_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a60074adf798d15093a41717b73dd7cdbcc95314d503ea411b34d7d6028ce26c_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b7357fea04ae79da416bcb41ace643795b17ba1a424f5208f4014cb946c7b96_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:beb189933e13703d2a1c380f5fa3199b217ba81c1b4588e03a4af9da8006925c_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:da6096a3652765dc0f6d36cd3a643413575f622116b7f6258df3b05eca98adb6_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e4530364cfa302bcff1ec17bc3989f7df5c80f8f3a27f77427043c7e120ff282_s390x"
],
"known_not_affected": [
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:ec64bb8be274454c0854dac68ddfac2cf3ab1650fd7e6cfdcda95b0f98f07b66_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:20c0ef9d1bb1b7cd0a1deb217ed800fba03f63e68cf355afc1700d45bc921d7e_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:2400f72a39fa2427fcfc063b0446906a84f5eafcdf625a0d11417cb78b1cbdbf_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:9c992a428197cbbc762c72c1d46d6ecd50eb97f721062d095981d599341209e0_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:bdb4d0454e366a0a4554946444a8665ed4b195396d7ac923f7b5441966634796_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:963d2459b057554c95bf686be1e851ec17e689484694bbf58408c363ea47e372_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9bea2f5fa07a04997ffd8e18ffd9bfd412af320369daad0518e24dcf859798a6_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:acd08505de171d725be119bd4c5c9216d836896797aab9bafa009a6b52758e97_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e36382a6869b97ccc40a9d750728d110a343330c5130e2ac5a9d510ba6104b84_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:12:01+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift 1.6.z upgrade to 1.7.0",
"product_ids": [
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5a91979142045ec29c62fa5b0fc5da5c429f030bb9637a4519929cb7939da6a7_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b068930131628662669b1d8d9cfd24afb55c5ebe2bb607369bb0b5194e75dda_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:af2385783168ea28f359a0db7e9190268b37b4f249271b59299ec518efd76341_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:ef21ec8d62180cfd85a1d79cb21171e751b7a26faaeba6c9d7fd3fbe4ebd486a_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:270c8a89aeed36b4d3b274adb30c9c665e8c6ee8153b0064a09b7c385f9b8621_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a0e4fd71af27314a8459d00ced0c1295be9771e3000a4bf3aa5ab2881ae7c1a6_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ad386674c8a9223616a1b09e33ad0c9bbf3f8ee2c885d3ad9d3c7188023f7076_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b85a8af2cad841584c2a283827a39cea0cf59ef9cffa214f6972253f6138e456_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:25b7aae296854a42d5594b43969002a0ab3da401fe3c46ab0fd056a250830007_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:2fe055109b2edf1910d408acf6ac01ef24e0db1c2aecd83e858110eb235ccad9_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:5d1a89a16f5f009ff4908c3456810c757c8855afa39902d7e9cba0c4bc34ea06_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:80cad11b631b7aeb92ef3d0b82d3014a65a9bf4301760d72327d95a6e02c726f_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:418d08c8d29b17aa1d75bbb0cf0df7160de721796c1ac72712708c2af9b4f2d6_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:4fd65f99ebe2ba3d40678c7837364dc7dbd482c551673d161761f720e5319c05_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:8727ef2c0b328dc2e9b4b158d48bd7e4f7350373f89e57e8ccfa62d9fbd7b668_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9d0f077f8aff77644e66992ededc9948c7351b7f78859a1016b184073452b613_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0471d2271b97ec831bdca77d583ebca0ffd14b10bb20d6ff3c38d69d5ccf573_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e68464e70c7947879aeefa73e78a797c59c7a1d9442e571849eb8b5e6e4fb41d_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f244453dd2178ccb3599df966f5c5107892003265fbe91989ba4420fa868a706_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f33a2ff3cd1cbeb3c3404edb33314f6b59d8d3f7dda6b3b870ab9f3e545d8143_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:023336ed53784826511848f791e321d02904c451f4abfe7d00ef51054270ea4d_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2d6f4a64ec49640831b3069abbc9bd2204d9a300726908a6675073b0a97dfd5c_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:76da3554d23f9928a94c99e93f3a6cf9bfc95e2a96040fa310653bf77301cb93_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a60074adf798d15093a41717b73dd7cdbcc95314d503ea411b34d7d6028ce26c_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b7357fea04ae79da416bcb41ace643795b17ba1a424f5208f4014cb946c7b96_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:beb189933e13703d2a1c380f5fa3199b217ba81c1b4588e03a4af9da8006925c_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:da6096a3652765dc0f6d36cd3a643413575f622116b7f6258df3b05eca98adb6_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e4530364cfa302bcff1ec17bc3989f7df5c80f8f3a27f77427043c7e120ff282_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1938"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5a91979142045ec29c62fa5b0fc5da5c429f030bb9637a4519929cb7939da6a7_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b068930131628662669b1d8d9cfd24afb55c5ebe2bb607369bb0b5194e75dda_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:af2385783168ea28f359a0db7e9190268b37b4f249271b59299ec518efd76341_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:ef21ec8d62180cfd85a1d79cb21171e751b7a26faaeba6c9d7fd3fbe4ebd486a_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:270c8a89aeed36b4d3b274adb30c9c665e8c6ee8153b0064a09b7c385f9b8621_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a0e4fd71af27314a8459d00ced0c1295be9771e3000a4bf3aa5ab2881ae7c1a6_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ad386674c8a9223616a1b09e33ad0c9bbf3f8ee2c885d3ad9d3c7188023f7076_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b85a8af2cad841584c2a283827a39cea0cf59ef9cffa214f6972253f6138e456_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:25b7aae296854a42d5594b43969002a0ab3da401fe3c46ab0fd056a250830007_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:2fe055109b2edf1910d408acf6ac01ef24e0db1c2aecd83e858110eb235ccad9_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:5d1a89a16f5f009ff4908c3456810c757c8855afa39902d7e9cba0c4bc34ea06_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:80cad11b631b7aeb92ef3d0b82d3014a65a9bf4301760d72327d95a6e02c726f_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:418d08c8d29b17aa1d75bbb0cf0df7160de721796c1ac72712708c2af9b4f2d6_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:4fd65f99ebe2ba3d40678c7837364dc7dbd482c551673d161761f720e5319c05_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:8727ef2c0b328dc2e9b4b158d48bd7e4f7350373f89e57e8ccfa62d9fbd7b668_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9d0f077f8aff77644e66992ededc9948c7351b7f78859a1016b184073452b613_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:ec64bb8be274454c0854dac68ddfac2cf3ab1650fd7e6cfdcda95b0f98f07b66_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0471d2271b97ec831bdca77d583ebca0ffd14b10bb20d6ff3c38d69d5ccf573_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e68464e70c7947879aeefa73e78a797c59c7a1d9442e571849eb8b5e6e4fb41d_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f244453dd2178ccb3599df966f5c5107892003265fbe91989ba4420fa868a706_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f33a2ff3cd1cbeb3c3404edb33314f6b59d8d3f7dda6b3b870ab9f3e545d8143_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:20c0ef9d1bb1b7cd0a1deb217ed800fba03f63e68cf355afc1700d45bc921d7e_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:2400f72a39fa2427fcfc063b0446906a84f5eafcdf625a0d11417cb78b1cbdbf_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:9c992a428197cbbc762c72c1d46d6ecd50eb97f721062d095981d599341209e0_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:bdb4d0454e366a0a4554946444a8665ed4b195396d7ac923f7b5441966634796_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:963d2459b057554c95bf686be1e851ec17e689484694bbf58408c363ea47e372_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9bea2f5fa07a04997ffd8e18ffd9bfd412af320369daad0518e24dcf859798a6_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:acd08505de171d725be119bd4c5c9216d836896797aab9bafa009a6b52758e97_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e36382a6869b97ccc40a9d750728d110a343330c5130e2ac5a9d510ba6104b84_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:023336ed53784826511848f791e321d02904c451f4abfe7d00ef51054270ea4d_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2d6f4a64ec49640831b3069abbc9bd2204d9a300726908a6675073b0a97dfd5c_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:76da3554d23f9928a94c99e93f3a6cf9bfc95e2a96040fa310653bf77301cb93_s390x",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a60074adf798d15093a41717b73dd7cdbcc95314d503ea411b34d7d6028ce26c_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b7357fea04ae79da416bcb41ace643795b17ba1a424f5208f4014cb946c7b96_ppc64le",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:beb189933e13703d2a1c380f5fa3199b217ba81c1b4588e03a4af9da8006925c_arm64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:da6096a3652765dc0f6d36cd3a643413575f622116b7f6258df3b05eca98adb6_amd64",
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e4530364cfa302bcff1ec17bc3989f7df5c80f8f3a27f77427043c7e120ff282_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2147
Vulnerability from csaf_redhat - Published: 2026-02-05 15:58 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Kiali 2.4.12 for Red Hat OpenShift Service Mesh 3.0\n\nThis update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kiali 2.4.12, for Red Hat OpenShift Service Mesh 3.0, provides observability for the service mesh by offering a visual representation of the mesh topology and metrics, helping users monitor, trace, and manage efficiently\n\nSecurity Fix(es):\n\n* kiali-ossmc-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284)\n\n* kiali-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284)\n\n* kiali-rhel9: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)\n\n* kiali-ossmc-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)\n\n* kiali-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)\n\n* kiali-ossmc-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)\n\n* kiali-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2147",
"url": "https://access.redhat.com/errata/RHSA-2026:2147"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13465",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22029",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-13465",
"url": "https://access.redhat.com/security/cve/cve-2025-13465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-15284",
"url": "https://access.redhat.com/security/cve/cve-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61729",
"url": "https://access.redhat.com/security/cve/cve-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2026-22029",
"url": "https://access.redhat.com/security/cve/cve-2026-22029"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification",
"url": "https://access.redhat.com/security/updates/classification"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2147.json"
}
],
"title": "Red Hat Security Advisory: Kiali 2.4.12 for Red Hat OpenShift Service Mesh 3.0",
"tracking": {
"current_release_date": "2026-02-11T08:53:13+00:00",
"generator": {
"date": "2026-02-11T08:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2147",
"initial_release_date": "2026-02-05T15:58:12+00:00",
"revision_history": [
{
"date": "2026-02-05T15:58:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T15:58:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Service Mesh 3.0",
"product": {
"name": "Red Hat OpenShift Service Mesh 3.0",
"product_id": "Red Hat OpenShift Service Mesh 3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:3.0::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Ad188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3Ad843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140791"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Aada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3A19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140791"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3A6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3Ac1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140791"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3A527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3A94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140791"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64 as a component of Red Hat OpenShift Service Mesh 3.0",
"product_id": "Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x as a component of Red Hat OpenShift Service Mesh 3.0",
"product_id": "Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le as a component of Red Hat OpenShift Service Mesh 3.0",
"product_id": "Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64 as a component of Red Hat OpenShift Service Mesh 3.0",
"product_id": "Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x as a component of Red Hat OpenShift Service Mesh 3.0",
"product_id": "Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le as a component of Red Hat OpenShift Service Mesh 3.0",
"product_id": "Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64 as a component of Red Hat OpenShift Service Mesh 3.0",
"product_id": "Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64 as a component of Red Hat OpenShift Service Mesh 3.0",
"product_id": "Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13465",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2026-01-21T20:01:28.774829+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431740"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Lodash. A prototype pollution vulnerability in the _.unset and _.omit functions allows an attacker able to control property paths to delete methods from global prototypes. By removing essential functionalities, this can result in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: prototype pollution in _.unset and _.omit functions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable by applications using the _.unset and _.omit functions on an object and allowing user input to determine the path of the property to be removed. This issue only allows the deletion of properties but does not allow overwriting their behavior, limiting the impact to a denial of service. Due to this reason, this vulnerability has been rated with an important severity.\n\nIn Grafana, JavaScript code runs only in the browser, while the server side is all Golang. Therefore, the worst-case scenario is a loss of functionality in the client application inside the browser. To reflect this, the CVSS availability metric and the severity of the Grafana and the Grafana-PCP component have been updated to low and moderate, respectively.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "RHBZ#2431740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
"url": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg"
}
],
"release_date": "2026-01-21T19:05:28.846000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:58:12+00:00",
"details": "See Kiali 2.4.12 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.0/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2147"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement strict input validation before passing any property paths to the _.unset and _.omit functions to block attempts to access the prototype chain. Ensure that strings like __proto__, constructor and prototype are blocked, for example.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: prototype pollution in _.unset and _.omit functions"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:58:12+00:00",
"details": "See Kiali 2.4.12 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.0/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2147"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:58:12+00:00",
"details": "See Kiali 2.4.12 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.0/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2147"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2026-22029",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-01-10T04:01:03.694749+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428412"
}
],
"notes": [
{
"category": "description",
"text": "React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs causing unintended javascript execution on the client. This is only an issue if you are creating redirect paths from untrusted content or via an open redirect. There is no impact if Declarative Mode (\u003cBrowserRouter\u003e) is being used. This issue has been patched in @remix-run/router version 1.23.2 and react-router version 7.12.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "RHBZ#2428412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22029",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22029"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx",
"url": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx"
}
],
"release_date": "2026-01-10T02:42:32.736000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:58:12+00:00",
"details": "See Kiali 2.4.12 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.0/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2147"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:19c44dfb277123122abafc25552fe408ea7ad6dc026aa592f53e3a754ca0a44f_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:94fc56d838f03fd43cacfc219626464469fae9ebf24e10a6b2e3de710d9da268_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c1db580dd0b4417b069cf8bc9d691047e7b31406fd75075e1e63df6ba5f1799e_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d843214da448c340907b3eee5fb95ed6937b61897c2d3d7d54f0aad1f7423a9d_amd64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:527fd434b3b1f9b9304adbedd89a593ca347a84571a68c7935afe6aa207db49f_s390x",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:6300ec1cc673e8eb40333fe98e69845c995116a5c4c80cf37f78209fc3ad1883_ppc64le",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ada195cbb75fa307fbbc82856a34991d6e88b39be01d2b0b38a4be77e1c80ebd_arm64",
"Red Hat OpenShift Service Mesh 3.0:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d188f4e95efbc9c699975ac101a746ee2ccf0313e8b6ef2834c36540ffee9b34_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects"
}
]
}
RHSA-2026:2441
Vulnerability from csaf_redhat - Published: 2026-02-10 13:45 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2441",
"url": "https://access.redhat.com/errata/RHSA-2026:2441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2441.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:20+00:00",
"generator": {
"date": "2026-02-11T08:53:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2441",
"initial_release_date": "2026-02-10T13:45:07+00:00",
"revision_history": [
{
"date": "2026-02-10T13:45:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-10T13:45:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src (go-toolset:rhel8)",
"product_id": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.9.1-1.module%2Bel8.8.0%2B16778%2B5fbb74f5?arch=src\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.19.13-4.module%2Bel8.8.0%2B23976%2B18ba1869?arch=src\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src (go-toolset:rhel8)",
"product_id": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-19.module%2Bel8.8.0%2B23965%2Baadf92d2?arch=src\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.9.1-1.module%2Bel8.8.0%2B16778%2B5fbb74f5?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.9.1-1.module%2Bel8.8.0%2B16778%2B5fbb74f5?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.9.1-1.module%2Bel8.8.0%2B16778%2B5fbb74f5?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.19.13-4.module%2Bel8.8.0%2B23976%2B18ba1869?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-19.module%2Bel8.8.0%2B23965%2Baadf92d2?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.19.13-19.module%2Bel8.8.0%2B23965%2Baadf92d2?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.19.13-19.module%2Bel8.8.0%2B23965%2Baadf92d2?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.19.13-19.module%2Bel8.8.0%2B23965%2Baadf92d2?arch=noarch\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.19.13-19.module%2Bel8.8.0%2B23965%2Baadf92d2?arch=noarch\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.19.13-19.module%2Bel8.8.0%2B23965%2Baadf92d2?arch=noarch\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.19.13-19.module%2Bel8.8.0%2B23965%2Baadf92d2?arch=noarch\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.ppc64le::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.ppc64le (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.19.13-4.module%2Bel8.8.0%2B23976%2B18ba1869?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le (go-toolset:rhel8)",
"product_id": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-19.module%2Bel8.8.0%2B23965%2Baadf92d2?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.19.13-19.module%2Bel8.8.0%2B23965%2Baadf92d2?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8080020260209154909:6b4b45d8"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.ppc64le::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.ppc64le::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T13:45:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.ppc64le::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2441"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.ppc64le::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.ppc64le::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.E4S:golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-debuginfo-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:delve-debugsource-0:1.9.1-1.module+el8.8.0+16778+5fbb74f5.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:go-toolset-0:1.19.13-4.module+el8.8.0+23976+18ba1869.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.src::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-bin-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-docs-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-misc-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-race-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.x86_64::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-src-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8",
"AppStream-8.8.0.Z.TUS:golang-tests-0:1.19.13-19.module+el8.8.0+23965+aadf92d2.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2218
Vulnerability from csaf_redhat - Published: 2026-02-09 01:55 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2218",
"url": "https://access.redhat.com/errata/RHSA-2026:2218"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2218.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:15+00:00",
"generator": {
"date": "2026-02-11T08:53:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2218",
"initial_release_date": "2026-02-09T01:55:26+00:00",
"revision_history": [
{
"date": "2026-02-09T01:55:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T01:55:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.21.13-13.el9_4.aarch64",
"product": {
"name": "go-toolset-0:1.21.13-13.el9_4.aarch64",
"product_id": "go-toolset-0:1.21.13-13.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.21.13-13.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.21.13-13.el9_4.aarch64",
"product": {
"name": "golang-0:1.21.13-13.el9_4.aarch64",
"product_id": "golang-0:1.21.13-13.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.21.13-13.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.21.13-13.el9_4.aarch64",
"product": {
"name": "golang-bin-0:1.21.13-13.el9_4.aarch64",
"product_id": "golang-bin-0:1.21.13-13.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.21.13-13.el9_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.21.13-13.el9_4.ppc64le",
"product": {
"name": "go-toolset-0:1.21.13-13.el9_4.ppc64le",
"product_id": "go-toolset-0:1.21.13-13.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.21.13-13.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.21.13-13.el9_4.ppc64le",
"product": {
"name": "golang-0:1.21.13-13.el9_4.ppc64le",
"product_id": "golang-0:1.21.13-13.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.21.13-13.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.21.13-13.el9_4.ppc64le",
"product": {
"name": "golang-bin-0:1.21.13-13.el9_4.ppc64le",
"product_id": "golang-bin-0:1.21.13-13.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.21.13-13.el9_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.21.13-13.el9_4.x86_64",
"product": {
"name": "go-toolset-0:1.21.13-13.el9_4.x86_64",
"product_id": "go-toolset-0:1.21.13-13.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.21.13-13.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.21.13-13.el9_4.x86_64",
"product": {
"name": "golang-0:1.21.13-13.el9_4.x86_64",
"product_id": "golang-0:1.21.13-13.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.21.13-13.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.21.13-13.el9_4.x86_64",
"product": {
"name": "golang-bin-0:1.21.13-13.el9_4.x86_64",
"product_id": "golang-bin-0:1.21.13-13.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.21.13-13.el9_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.21.13-13.el9_4.s390x",
"product": {
"name": "go-toolset-0:1.21.13-13.el9_4.s390x",
"product_id": "go-toolset-0:1.21.13-13.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.21.13-13.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.21.13-13.el9_4.s390x",
"product": {
"name": "golang-0:1.21.13-13.el9_4.s390x",
"product_id": "golang-0:1.21.13-13.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.21.13-13.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.21.13-13.el9_4.s390x",
"product": {
"name": "golang-bin-0:1.21.13-13.el9_4.s390x",
"product_id": "golang-bin-0:1.21.13-13.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.21.13-13.el9_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.21.13-13.el9_4.src",
"product": {
"name": "golang-0:1.21.13-13.el9_4.src",
"product_id": "golang-0:1.21.13-13.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.21.13-13.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.21.13-13.el9_4.noarch",
"product": {
"name": "golang-docs-0:1.21.13-13.el9_4.noarch",
"product_id": "golang-docs-0:1.21.13-13.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.21.13-13.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.21.13-13.el9_4.noarch",
"product": {
"name": "golang-misc-0:1.21.13-13.el9_4.noarch",
"product_id": "golang-misc-0:1.21.13-13.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.21.13-13.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.21.13-13.el9_4.noarch",
"product": {
"name": "golang-src-0:1.21.13-13.el9_4.noarch",
"product_id": "golang-src-0:1.21.13-13.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.21.13-13.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.21.13-13.el9_4.noarch",
"product": {
"name": "golang-tests-0:1.21.13-13.el9_4.noarch",
"product_id": "golang-tests-0:1.21.13-13.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.21.13-13.el9_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.21.13-13.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.aarch64"
},
"product_reference": "go-toolset-0:1.21.13-13.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.21.13-13.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.ppc64le"
},
"product_reference": "go-toolset-0:1.21.13-13.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.21.13-13.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.s390x"
},
"product_reference": "go-toolset-0:1.21.13-13.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.21.13-13.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.x86_64"
},
"product_reference": "go-toolset-0:1.21.13-13.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.21.13-13.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.aarch64"
},
"product_reference": "golang-0:1.21.13-13.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.21.13-13.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.ppc64le"
},
"product_reference": "golang-0:1.21.13-13.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.21.13-13.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.s390x"
},
"product_reference": "golang-0:1.21.13-13.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.21.13-13.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.src"
},
"product_reference": "golang-0:1.21.13-13.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.21.13-13.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.x86_64"
},
"product_reference": "golang-0:1.21.13-13.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.21.13-13.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.aarch64"
},
"product_reference": "golang-bin-0:1.21.13-13.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.21.13-13.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.ppc64le"
},
"product_reference": "golang-bin-0:1.21.13-13.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.21.13-13.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.s390x"
},
"product_reference": "golang-bin-0:1.21.13-13.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.21.13-13.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.x86_64"
},
"product_reference": "golang-bin-0:1.21.13-13.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.21.13-13.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-13.el9_4.noarch"
},
"product_reference": "golang-docs-0:1.21.13-13.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.21.13-13.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-13.el9_4.noarch"
},
"product_reference": "golang-misc-0:1.21.13-13.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.21.13-13.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-13.el9_4.noarch"
},
"product_reference": "golang-src-0:1.21.13-13.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.21.13-13.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-13.el9_4.noarch"
},
"product_reference": "golang-tests-0:1.21.13-13.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.src",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-13.el9_4.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T01:55:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.src",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-13.el9_4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2218"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.src",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-13.el9_4.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1518
Vulnerability from csaf_redhat - Published: 2026-01-28 23:26 - Updated: 2026-02-11 08:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1518",
"url": "https://access.redhat.com/errata/RHSA-2026:1518"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1518.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-02-11T08:52:50+00:00",
"generator": {
"date": "2026-02-11T08:52:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1518",
"initial_release_date": "2026-01-28T23:26:14+00:00",
"revision_history": [
{
"date": "2026-01-28T23:26:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-28T23:26:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:52:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-11.el8_10.src",
"product": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.src",
"product_id": "grafana-pcp-0:5.1.1-11.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-11.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"product": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"product_id": "grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-11.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-11.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-11.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"product_id": "grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-11.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-11.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-11.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"product": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"product_id": "grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-11.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-11.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-11.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-11.el8_10.s390x",
"product": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.s390x",
"product_id": "grafana-pcp-0:5.1.1-11.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-11.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"product_id": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-11.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-11.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.aarch64"
},
"product_reference": "grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.s390x"
},
"product_reference": "grafana-pcp-0:5.1.1-11.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.src"
},
"product_reference": "grafana-pcp-0:5.1.1-11.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.x86_64"
},
"product_reference": "grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T23:26:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1518"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2219
Vulnerability from csaf_redhat - Published: 2026-02-09 01:48 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2219",
"url": "https://access.redhat.com/errata/RHSA-2026:2219"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2219.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:16+00:00",
"generator": {
"date": "2026-02-11T08:53:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2219",
"initial_release_date": "2026-02-09T01:48:16+00:00",
"revision_history": [
{
"date": "2026-02-09T01:48:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T01:48:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.19.13-21.el9_2.src",
"product": {
"name": "golang-0:1.19.13-21.el9_2.src",
"product_id": "golang-0:1.19.13-21.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-21.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.19.13-21.el9_2.aarch64",
"product": {
"name": "golang-0:1.19.13-21.el9_2.aarch64",
"product_id": "golang-0:1.19.13-21.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-21.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.19.13-21.el9_2.aarch64",
"product": {
"name": "golang-bin-0:1.19.13-21.el9_2.aarch64",
"product_id": "golang-bin-0:1.19.13-21.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.19.13-21.el9_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.19.13-21.el9_2.ppc64le",
"product": {
"name": "golang-0:1.19.13-21.el9_2.ppc64le",
"product_id": "golang-0:1.19.13-21.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-21.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.19.13-21.el9_2.ppc64le",
"product": {
"name": "golang-bin-0:1.19.13-21.el9_2.ppc64le",
"product_id": "golang-bin-0:1.19.13-21.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.19.13-21.el9_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.19.13-21.el9_2.x86_64",
"product": {
"name": "golang-0:1.19.13-21.el9_2.x86_64",
"product_id": "golang-0:1.19.13-21.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-21.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.19.13-21.el9_2.x86_64",
"product": {
"name": "golang-bin-0:1.19.13-21.el9_2.x86_64",
"product_id": "golang-bin-0:1.19.13-21.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.19.13-21.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.19.13-21.el9_2.x86_64",
"product": {
"name": "golang-race-0:1.19.13-21.el9_2.x86_64",
"product_id": "golang-race-0:1.19.13-21.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.19.13-21.el9_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.19.13-21.el9_2.s390x",
"product": {
"name": "golang-0:1.19.13-21.el9_2.s390x",
"product_id": "golang-0:1.19.13-21.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.19.13-21.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.19.13-21.el9_2.s390x",
"product": {
"name": "golang-bin-0:1.19.13-21.el9_2.s390x",
"product_id": "golang-bin-0:1.19.13-21.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.19.13-21.el9_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.19.13-21.el9_2.noarch",
"product": {
"name": "golang-docs-0:1.19.13-21.el9_2.noarch",
"product_id": "golang-docs-0:1.19.13-21.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.19.13-21.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.19.13-21.el9_2.noarch",
"product": {
"name": "golang-misc-0:1.19.13-21.el9_2.noarch",
"product_id": "golang-misc-0:1.19.13-21.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.19.13-21.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.19.13-21.el9_2.noarch",
"product": {
"name": "golang-src-0:1.19.13-21.el9_2.noarch",
"product_id": "golang-src-0:1.19.13-21.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.19.13-21.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.19.13-21.el9_2.noarch",
"product": {
"name": "golang-tests-0:1.19.13-21.el9_2.noarch",
"product_id": "golang-tests-0:1.19.13-21.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.19.13-21.el9_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-21.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.aarch64"
},
"product_reference": "golang-0:1.19.13-21.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-21.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.ppc64le"
},
"product_reference": "golang-0:1.19.13-21.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-21.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.s390x"
},
"product_reference": "golang-0:1.19.13-21.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-21.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.src"
},
"product_reference": "golang-0:1.19.13-21.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.19.13-21.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.x86_64"
},
"product_reference": "golang-0:1.19.13-21.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.19.13-21.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.aarch64"
},
"product_reference": "golang-bin-0:1.19.13-21.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.19.13-21.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.ppc64le"
},
"product_reference": "golang-bin-0:1.19.13-21.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.19.13-21.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.s390x"
},
"product_reference": "golang-bin-0:1.19.13-21.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.19.13-21.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.x86_64"
},
"product_reference": "golang-bin-0:1.19.13-21.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.19.13-21.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-21.el9_2.noarch"
},
"product_reference": "golang-docs-0:1.19.13-21.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.19.13-21.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-21.el9_2.noarch"
},
"product_reference": "golang-misc-0:1.19.13-21.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.19.13-21.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-21.el9_2.x86_64"
},
"product_reference": "golang-race-0:1.19.13-21.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.19.13-21.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-21.el9_2.noarch"
},
"product_reference": "golang-src-0:1.19.13-21.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.19.13-21.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-21.el9_2.noarch"
},
"product_reference": "golang-tests-0:1.19.13-21.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.src",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-21.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-21.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-21.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-21.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-21.el9_2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T01:48:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.src",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-21.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-21.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-21.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-21.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-21.el9_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2219"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.src",
"AppStream-9.2.0.Z.E4S:golang-0:1.19.13-21.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.aarch64",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.ppc64le",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.s390x",
"AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-21.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-21.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-21.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-21.el9_2.x86_64",
"AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-21.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-21.el9_2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1018
Vulnerability from csaf_redhat - Published: 2026-01-22 15:52 - Updated: 2026-02-11 13:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Important: Red Hat OpenShift GitOps v1.17.4 security update",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat OpenShift GitOps.\nBug Fix(es) and Enhancement(s):\n* GITOPS-8231 (CVE-2025-47913 openshift-gitops-1/argocd-agent-rhel8: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS [gitops-1.17])\n* GITOPS-8233 (CVE-2025-47913 openshift-gitops-1/argocd-rhel9: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS [gitops-1.17])\n* GITOPS-8078 (CVE-2025-58183 openshift-gitops-1/argocd-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.17])\n* GITOPS-8081 (CVE-2025-58183 openshift-gitops-1/dex-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.17])\n* GITOPS-7753 (CVE-2025-58754 openshift-gitops-1/argocd-extensions-rhel8: Axios DoS via lack of data size check [gitops-1.17])\n* GITOPS-8511 (CVE-2025-68156 openshift-gitops-1/argocd-rhel8: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.17])\n* GITOPS-8512 (CVE-2025-68156 openshift-gitops-1/argocd-rhel9: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.17])\n* GITOPS-7568 (ignoreDifferences setting is not honored for OAuthClient resource)\n* GITOPS-7992 (openshift-gitops-operator-metrics-monitor ServiceMonitor is attempting to use a bearerTokenFile configuration in its endpoints definition)\n* GITOPS-8225 (RC 1.19.0-2 : haproxy replica remains 1 with HA upgrade)\n* GITOPS-8411 (CVE-2025-55190 still blocking due to github.com/argoproj/argo-cd/v2@v2.14.11 in gitops-rhel8:v1.18.1)\n* GITOPS-8591 (Reciving TargetDown after upgrading GitOps )",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1018",
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-55190",
"url": "https://access.redhat.com/security/cve/CVE-2025-55190"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58754",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68156",
"url": "https://access.redhat.com/security/cve/CVE-2025-68156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.17/",
"url": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.17/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1018.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift GitOps v1.17.4 security update",
"tracking": {
"current_release_date": "2026-02-11T13:00:45+00:00",
"generator": {
"date": "2026-02-11T13:00:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1018",
"initial_release_date": "2026-01-22T15:52:24+00:00",
"revision_history": [
{
"date": "2026-01-22T15:52:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-23T04:51:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T13:00:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift GitOps 1.17",
"product": {
"name": "Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_gitops:1.17::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift GitOps"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Ac1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825455"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3Af5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824729"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824533"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824532"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Af626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824983"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Ab5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825799"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Ad12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824960"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-operator-bundle@sha256%3A710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768828150"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Ae76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824197"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825455"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Aa922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824729"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824533"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824532"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824983"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Ac89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825799"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Ac8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824960"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Abc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824197"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825455"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824729"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824533"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824532"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Acf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824983"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825799"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Ae7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824960"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Ac8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824197"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825455"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824729"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824533"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824532"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824983"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825799"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824960"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Adab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824197"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-55190",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-08-21T07:09:49.658000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2390026"
}
],
"notes": [
{
"category": "description",
"text": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. In versions 2.13.0 through 2.13.8, 2.14.0 through 2.14.15, 3.0.0 through 3.0.12 and 3.1.0-rc1 through 3.1.1, API tokens with project-level permissions are able to retrieve sensitive repository credentials (usernames, passwords) through the project details API endpoint, even when the token only has standard application management permissions and no explicit access to secrets. This vulnerability does not only affect project-level permissions. Any token with project get permissions is also vulnerable, including global permissions such as: `p, role/user, projects, get, *, allow`. This issue is fixed in versions 2.13.9, 2.14.16, 3.0.14 and 3.1.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/argoproj/argo-cd: Project API Token Exposes Repository Credentials",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has Important impact as exploitation requires some privileges granted by the system. An attacker would either need the ability to create an API token (via having valid login credentials) or to have stolen an API token from a legitimate user. It does not grant full control over the system, attackers can only tamper with the project(s) associated with an API token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55190"
},
{
"category": "external",
"summary": "RHBZ#2390026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2390026"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55190"
},
{
"category": "external",
"summary": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-786q-9hcg-v9ff",
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-786q-9hcg-v9ff"
}
],
"release_date": "2025-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/argoproj/argo-cd: Project API Token Exposes Repository Credentials"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-58754",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-12T02:00:53.897605+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394735"
}
],
"notes": [
{
"category": "description",
"text": "Axios is a promise based HTTP client for the browser and Node.js. When Axios starting in version 0.28.0 and prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: \u0027stream\u0027`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios DoS via lack of data size check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Availability impact is limited to the application which bundles axios and not the host Red Hat system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "RHBZ#2394735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593",
"url": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/pull/7011",
"url": "https://github.com/axios/axios/pull/7011"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.12.0",
"url": "https://github.com/axios/axios/releases/tag/v1.12.0"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj",
"url": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj"
}
],
"release_date": "2025-09-12T01:16:40.513000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "axios: Axios DoS via lack of data size check"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68156",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-16T19:01:42.049157+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2422891"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Expr, an expression language and expression evaluation for Go. This vulnerability allows a denial of service (DoS) via recursive traversal over user-provided deeply nested or cyclic data structures without enforcing a maximum recursion depth, leading to a stack overflow panic and application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products utilizing the `Expr` Go library because it can lead to a denial-of-service. Exploitation requires an application to evaluate expressions against untrusted or insufficiently validated data structures containing deeply nested or cyclic references, which can cause a stack overflow and application crash. Products that do not process untrusted input with `Expr` are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68156"
},
{
"category": "external",
"summary": "RHBZ#2422891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2422891"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68156"
},
{
"category": "external",
"summary": "https://github.com/expr-lang/expr/pull/870",
"url": "https://github.com/expr-lang/expr/pull/870"
},
{
"category": "external",
"summary": "https://github.com/expr-lang/expr/security/advisories/GHSA-cfpf-hrx2-8rv6",
"url": "https://github.com/expr-lang/expr/security/advisories/GHSA-cfpf-hrx2-8rv6"
}
],
"release_date": "2025-12-16T18:24:11.648000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications using the `Expr` library should ensure that evaluation environments do not contain cyclic references. Additionally, externally supplied data structures must be validated or sanitized before being passed to `Expr` for evaluation. As a last-resort defensive measure, expression evaluation can be wrapped with panic recovery to prevent a full process crash.",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation"
}
]
}
RHSA-2026:1908
Vulnerability from csaf_redhat - Published: 2026-02-04 16:10 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for opentelemetry-collector is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Collector with the supported components for a Red Hat build of OpenTelemetry\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1908",
"url": "https://access.redhat.com/errata/RHSA-2026:1908"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1908.json"
}
],
"title": "Red Hat Security Advisory: opentelemetry-collector security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:08+00:00",
"generator": {
"date": "2026-02-11T08:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1908",
"initial_release_date": "2026-02-04T16:10:41+00:00",
"revision_history": [
{
"date": "2026-02-04T16:10:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-04T16:10:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.src",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.src",
"product_id": "opentelemetry-collector-0:0.135.0-3.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.aarch64",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.aarch64",
"product_id": "opentelemetry-collector-0:0.135.0-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.ppc64le",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.ppc64le",
"product_id": "opentelemetry-collector-0:0.135.0-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.x86_64",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.x86_64",
"product_id": "opentelemetry-collector-0:0.135.0-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.s390x",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.s390x",
"product_id": "opentelemetry-collector-0:0.135.0-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.aarch64"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.ppc64le"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.s390x"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.src"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.x86_64"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T16:10:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1908"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:opentelemetry-collector-0:0.135.0-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:0981
Vulnerability from csaf_redhat - Published: 2026-01-22 10:00 - Updated: 2026-02-11 13:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cert-manager Operator for Red Hat OpenShift 1.18.1",
"title": "Topic"
},
{
"category": "general",
"text": "The cert-manager Operator for Red Hat OpenShift builds on top of Kubernetes, introducing certificate authorities\nand certificates as first-class resource types in the Kubernetes API. This makes it possible to provide\ncertificates-as-a-service to developers working within your Kubernetes cluster.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0981",
"url": "https://access.redhat.com/errata/RHSA-2026:0981"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html",
"url": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0981.json"
}
],
"title": "Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1",
"tracking": {
"current_release_date": "2026-02-11T13:00:41+00:00",
"generator": {
"date": "2026-02-11T13:00:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:0981",
"initial_release_date": "2026-01-22T10:00:40+00:00",
"revision_history": [
{
"date": "2026-01-22T10:00:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-22T10:00:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T13:00:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product": {
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cert_manager:1.18::el9"
}
}
}
],
"category": "product_family",
"name": "cert-manager operator for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3A4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e?arch=amd64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985261"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3Add0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3?arch=s390x\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985261"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3Aa80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031?arch=ppc64le\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985261"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3A8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d?arch=arm64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985261"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T10:00:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0981"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T10:00:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0981"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T10:00:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0981"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:4e186b76cec8f162904aae30c97214d0ea0848d604359e4af82c3d00085ba78e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:8eac3d4788c890f90e5a07e28e5dff6e7b0f68cf78e60f9756c7f72c2f9b9a0d_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:a80fc30a2570bde4cd9d64b3028c2fb05dc9d4c82f75613de11bdd17b9e37031_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:dd0d8fdf98eaa5d4437cfa1f4304823e9596fa0d8f0cf20aec5b20b9052255d3_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
}
]
}
RHSA-2026:1813
Vulnerability from csaf_redhat - Published: 2026-02-03 14:57 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1813",
"url": "https://access.redhat.com/errata/RHSA-2026:1813"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1813.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:06+00:00",
"generator": {
"date": "2026-02-11T08:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1813",
"initial_release_date": "2026-02-03T14:57:18+00:00",
"revision_history": [
{
"date": "2026-02-03T14:57:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-03T14:57:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el9_6.aarch64",
"product": {
"name": "go-toolset-0:1.25.5-1.el9_6.aarch64",
"product_id": "go-toolset-0:1.25.5-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el9_6.aarch64",
"product": {
"name": "golang-0:1.25.5-1.el9_6.aarch64",
"product_id": "golang-0:1.25.5-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el9_6.aarch64",
"product": {
"name": "golang-bin-0:1.25.5-1.el9_6.aarch64",
"product_id": "golang-bin-0:1.25.5-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el9_6.aarch64",
"product": {
"name": "golang-race-0:1.25.5-1.el9_6.aarch64",
"product_id": "golang-race-0:1.25.5-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el9_6.ppc64le",
"product": {
"name": "go-toolset-0:1.25.5-1.el9_6.ppc64le",
"product_id": "go-toolset-0:1.25.5-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el9_6.ppc64le",
"product": {
"name": "golang-0:1.25.5-1.el9_6.ppc64le",
"product_id": "golang-0:1.25.5-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el9_6.ppc64le",
"product": {
"name": "golang-bin-0:1.25.5-1.el9_6.ppc64le",
"product_id": "golang-bin-0:1.25.5-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el9_6.ppc64le",
"product": {
"name": "golang-race-0:1.25.5-1.el9_6.ppc64le",
"product_id": "golang-race-0:1.25.5-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el9_6.x86_64",
"product": {
"name": "go-toolset-0:1.25.5-1.el9_6.x86_64",
"product_id": "go-toolset-0:1.25.5-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el9_6.x86_64",
"product": {
"name": "golang-0:1.25.5-1.el9_6.x86_64",
"product_id": "golang-0:1.25.5-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el9_6.x86_64",
"product": {
"name": "golang-bin-0:1.25.5-1.el9_6.x86_64",
"product_id": "golang-bin-0:1.25.5-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el9_6.x86_64",
"product": {
"name": "golang-race-0:1.25.5-1.el9_6.x86_64",
"product_id": "golang-race-0:1.25.5-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el9_6.s390x",
"product": {
"name": "go-toolset-0:1.25.5-1.el9_6.s390x",
"product_id": "go-toolset-0:1.25.5-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el9_6.s390x",
"product": {
"name": "golang-0:1.25.5-1.el9_6.s390x",
"product_id": "golang-0:1.25.5-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el9_6.s390x",
"product": {
"name": "golang-bin-0:1.25.5-1.el9_6.s390x",
"product_id": "golang-bin-0:1.25.5-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el9_6.s390x",
"product": {
"name": "golang-race-0:1.25.5-1.el9_6.s390x",
"product_id": "golang-race-0:1.25.5-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el9_6.src",
"product": {
"name": "golang-0:1.25.5-1.el9_6.src",
"product_id": "golang-0:1.25.5-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.5-1.el9_6.noarch",
"product": {
"name": "golang-docs-0:1.25.5-1.el9_6.noarch",
"product_id": "golang-docs-0:1.25.5-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.5-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.5-1.el9_6.noarch",
"product": {
"name": "golang-misc-0:1.25.5-1.el9_6.noarch",
"product_id": "golang-misc-0:1.25.5-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.5-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.5-1.el9_6.noarch",
"product": {
"name": "golang-src-0:1.25.5-1.el9_6.noarch",
"product_id": "golang-src-0:1.25.5-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.5-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.5-1.el9_6.noarch",
"product": {
"name": "golang-tests-0:1.25.5-1.el9_6.noarch",
"product_id": "golang-tests-0:1.25.5-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.5-1.el9_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.aarch64"
},
"product_reference": "go-toolset-0:1.25.5-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.ppc64le"
},
"product_reference": "go-toolset-0:1.25.5-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.s390x"
},
"product_reference": "go-toolset-0:1.25.5-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.x86_64"
},
"product_reference": "go-toolset-0:1.25.5-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.aarch64"
},
"product_reference": "golang-0:1.25.5-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.ppc64le"
},
"product_reference": "golang-0:1.25.5-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.s390x"
},
"product_reference": "golang-0:1.25.5-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.src"
},
"product_reference": "golang-0:1.25.5-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.x86_64"
},
"product_reference": "golang-0:1.25.5-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.aarch64"
},
"product_reference": "golang-bin-0:1.25.5-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.ppc64le"
},
"product_reference": "golang-bin-0:1.25.5-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.s390x"
},
"product_reference": "golang-bin-0:1.25.5-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.x86_64"
},
"product_reference": "golang-bin-0:1.25.5-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.5-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.5-1.el9_6.noarch"
},
"product_reference": "golang-docs-0:1.25.5-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.5-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.5-1.el9_6.noarch"
},
"product_reference": "golang-misc-0:1.25.5-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.aarch64"
},
"product_reference": "golang-race-0:1.25.5-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.ppc64le"
},
"product_reference": "golang-race-0:1.25.5-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.s390x"
},
"product_reference": "golang-race-0:1.25.5-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.x86_64"
},
"product_reference": "golang-race-0:1.25.5-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.5-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-src-0:1.25.5-1.el9_6.noarch"
},
"product_reference": "golang-src-0:1.25.5-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.5-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.5-1.el9_6.noarch"
},
"product_reference": "golang-tests-0:1.25.5-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.5-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.5-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.5-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.5-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-03T14:57:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.5-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.5-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.5-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.5-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1813"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.5-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.5-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.5-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.5-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.5-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2136
Vulnerability from csaf_redhat - Published: 2026-02-05 15:17 - Updated: 2026-02-11 13:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The 1.3.2 release of Red Hat Trusted Artifact Signer OpenShift Operator.\nFor more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"title": "Topic"
},
{
"category": "general",
"text": "The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, and 4.20",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2136",
"url": "https://access.redhat.com/errata/RHSA-2026:2136"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66506",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22772",
"url": "https://access.redhat.com/security/cve/CVE-2026-22772"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2136.json"
}
],
"title": "Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release",
"tracking": {
"current_release_date": "2026-02-11T13:01:38+00:00",
"generator": {
"date": "2026-02-11T13:01:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2136",
"initial_release_date": "2026-02-05T15:17:09+00:00",
"revision_history": [
{
"date": "2026-02-05T15:17:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T15:17:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T13:01:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Trusted Artifact Signer 1.3",
"product": {
"name": "Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:trusted_artifact_signer:1.3::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Trusted Artifact Signer"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"product": {
"name": "registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"product_id": "registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cosign-rhel9@sha256%3Aa8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770107585"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"product": {
"name": "registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"product_id": "registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fetch-tsa-certs-rhel9@sha256%3A358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770107440"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"product": {
"name": "registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"product_id": "registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitsign-rhel9@sha256%3A3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770108193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"product_id": "registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rekor-cli-rhel9@sha256%3A63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770106163"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64",
"product": {
"name": "registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64",
"product_id": "registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64",
"product_identification_helper": {
"purl": "pkg:oci/updatetree-rhel9@sha256%3A67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770106156"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64"
},
"product_reference": "registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64"
},
"product_reference": "registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
},
"product_reference": "registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
},
"product_reference": "registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:17:09+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2136"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:17:09+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2136"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-66506",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2025-12-04T23:01:20.507333+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419056"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a free-to-use certificate authority. This vulnerability allows a denial of service (DoS) due to excessive memory allocation when processing a malicious OpenID Connect (OIDC) identity token containing numerous period characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as Fulcio, a certificate authority used for issuing code signing certificates, is susceptible to a denial of service when processing a specially crafted OpenID Connect (OIDC) token. This could lead to resource exhaustion and service unavailability in affected Red Hat products that utilize Fulcio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "RHBZ#2419056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a",
"url": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw"
}
],
"release_date": "2025-12-04T22:04:41.637000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:17:09+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2136"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token"
},
{
"cve": "CVE-2026-22772",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2026-01-12T22:01:21.336171+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428808"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a certificate authority for issuing code signing certificates. A remote attacker could exploit this by bypassing MetaIssuer URL validation due to unanchored regular expressions (regex) in the `metaRegex()` function. This vulnerability could lead to Server-Side Request Forgery (SSRF), allowing the attacker to probe internal network services. While the flaw only permits GET requests, preventing state changes or data exfiltration, it still poses a risk for internal network reconnaissance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fulcio: Fulcio: Server-Side Request Forgery (SSRF) via unanchored regex in MetaIssuer URL validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. A flaw in Fulcio\u0027s URL validation allows attackers to bypass security checks, leading to Server-Side Request Forgery (SSRF). This could enable internal network reconnaissance within affected Red Hat OpenShift and Ansible Automation Platform deployments, though it does not permit state changes or data exfiltration.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22772"
},
{
"category": "external",
"summary": "RHBZ#2428808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428808"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22772",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22772"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/eaae2f2be56df9dea5f9b439ec81bedae4c0978d",
"url": "https://github.com/sigstore/fulcio/commit/eaae2f2be56df9dea5f9b439ec81bedae4c0978d"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-59jp-pj84-45mr",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-59jp-pj84-45mr"
}
],
"release_date": "2026-01-12T20:58:53.659000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:17:09+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2136"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fulcio: Fulcio: Server-Side Request Forgery (SSRF) via unanchored regex in MetaIssuer URL validation"
}
]
}
RHSA-2026:2146
Vulnerability from csaf_redhat - Published: 2026-02-05 15:54 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The 1.3.2 release of Red Hat Trusted Artifact Signer OpenShift Operator.\nFor more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"title": "Topic"
},
{
"category": "general",
"text": "The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, and 4.20",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2146",
"url": "https://access.redhat.com/errata/RHSA-2026:2146"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2146.json"
}
],
"title": "Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release",
"tracking": {
"current_release_date": "2026-02-11T08:53:13+00:00",
"generator": {
"date": "2026-02-11T08:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2146",
"initial_release_date": "2026-02-05T15:54:06+00:00",
"revision_history": [
{
"date": "2026-02-05T15:54:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T15:54:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Trusted Artifact Signer 1.3",
"product": {
"name": "Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:trusted_artifact_signer:1.3::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Trusted Artifact Signer"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64",
"product_id": "registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhtas-operator-bundle@sha256%3A3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770117502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64",
"product_id": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhtas-rhel9-operator@sha256%3Af46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770117502"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:54:06+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2146"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1166
Vulnerability from csaf_redhat - Published: 2026-01-26 09:50 - Updated: 2026-02-11 13:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cert-manager Operator for Red Hat OpenShift 1.18.1",
"title": "Topic"
},
{
"category": "general",
"text": "The cert-manager Operator for Red Hat OpenShift builds on top of Kubernetes, introducing certificate authorities\nand certificates as first-class resource types in the Kubernetes API. This makes it possible to provide\ncertificates-as-a-service to developers working within your Kubernetes cluster.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1166",
"url": "https://access.redhat.com/errata/RHSA-2026:1166"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html",
"url": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1166.json"
}
],
"title": "Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1",
"tracking": {
"current_release_date": "2026-02-11T13:00:50+00:00",
"generator": {
"date": "2026-02-11T13:00:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1166",
"initial_release_date": "2026-01-26T09:50:40+00:00",
"revision_history": [
{
"date": "2026-01-26T09:50:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-26T09:50:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T13:00:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product": {
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cert_manager:1.18::el9"
}
}
}
],
"category": "product_family",
"name": "cert-manager operator for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3A41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656?arch=amd64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419291"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3Af5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997?arch=s390x\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419291"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3Ac06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23?arch=ppc64le\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419291"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"product": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"product_id": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cert-manager-istio-csr-rhel9@sha256%3A95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9?arch=arm64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419291"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x"
},
"product_reference": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T09:50:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1166"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T09:50:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1166"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T09:50:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1166"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:41df7aabbce42599bad7fdc721cd12aa6e12d17e1c0658fb3294a1f68483d656_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:95f5dfa4331fcfb96357ed28f4d7f0fd00d9419d9252e3cff3962aec6cedbeb9_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:c06ef32fa81956319770edd1e5cd16e57599a29cbc3cd62b7bc1d49f61c12f23_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:f5df0f7414cc58ec0a00f4e26d646cfee475b9b6a7853215782eae552513e997_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
}
]
}
RHSA-2026:2454
Vulnerability from csaf_redhat - Published: 2026-02-10 15:32 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "DevWorkspace Operator 0.39.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "The DevWorkspace Operator extends OpenShift to provide DevWorkspace support.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2454",
"url": "https://access.redhat.com/errata/RHSA-2026:2454"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/CRW-9839",
"url": "https://issues.redhat.com/browse/CRW-9839"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2454.json"
}
],
"title": "Red Hat Security Advisory: DevWorkspace Operator 0.39.0 release.",
"tracking": {
"current_release_date": "2026-02-11T08:53:20+00:00",
"generator": {
"date": "2026-02-11T08:53:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2454",
"initial_release_date": "2026-02-10T15:32:22+00:00",
"revision_history": [
{
"date": "2026-02-10T15:32:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-10T15:32:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "DevWorkspace Operator 0.39",
"product": {
"name": "DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devworkspace:0.39::el9"
}
}
}
],
"category": "product_family",
"name": "DevWorkspace Operator"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-rhel9-operator@sha256%3A28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c?arch=amd64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769461843"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-operator-bundle@sha256%3A25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b?arch=amd64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769466773"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-backup-rhel9@sha256%3Acce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551?arch=amd64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769463878"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-clone-rhel9@sha256%3Aa6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b?arch=amd64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769461957"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x",
"product_id": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-rhel9-operator@sha256%3Adfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a?arch=s390x\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769461843"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-backup-rhel9@sha256%3Aecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97?arch=s390x\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769463878"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-clone-rhel9@sha256%3Ad18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d?arch=s390x\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769461957"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le",
"product_id": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-rhel9-operator@sha256%3A775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5?arch=ppc64le\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769461843"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-backup-rhel9@sha256%3A219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47?arch=ppc64le\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769463878"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-clone-rhel9@sha256%3A308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6?arch=ppc64le\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769461957"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-rhel9-operator@sha256%3Adf3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db?arch=arm64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769461843"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-backup-rhel9@sha256%3A26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7?arch=arm64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769463878"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-clone-rhel9@sha256%3Acf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330?arch=arm64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1769461957"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64 as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64 as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64 as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64 as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64 as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64 as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64 as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x as a component of DevWorkspace Operator 0.39",
"product_id": "DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x",
"relates_to_product_reference": "DevWorkspace Operator 0.39"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x"
],
"known_not_affected": [
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T15:32:22+00:00",
"details": "To start using the DevWorkspace Operator, install the DevWorkspace Operator from OpenShift OperatorHub on OpenShift Container Platform 4.16 or higher.",
"product_ids": [
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2454"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x"
],
"known_not_affected": [
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T15:32:22+00:00",
"details": "To start using the DevWorkspace Operator, install the DevWorkspace Operator from OpenShift OperatorHub on OpenShift Container Platform 4.16 or higher.",
"product_ids": [
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2454"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:25b53c2a153cb957c82e414338da944d4f6e94853333f791367e5bf071717c6b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:219c9ff47cda184a937eeb0f95794cce1085698544e01e0b9a2d04eabf746b47_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:26c9d3860b3272f6077de4b7359409291d65be9bed46434c1686817dab4eafb7_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:cce5e5415ada0778b61fb74ffb518c5e1cffa68c13d2d7e636770725634d0551_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:ecdf98e0dae1223ca09599bb73a78e846c60d27bb17dae0daab936057836bb97_s390x",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:308fe34379ec88bb0c1bf3c74febb2be763276f1568ff9a9a0f1375deea7b5c6_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:a6e26ccec55c225a45a5f1640671c1d86d26c2d9527000e662941b488b42536b_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:cf8d932b11342e58a20b1b26f2e668fedbe987ef482e73fefa7d0ae160a70330_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:d18263cba6fc9a51955d6cb704444473955caeeb180d9ff60c8267ad00539e0d_s390x",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:28f42d5cff1157425e469ff40e71c7d38de004b56edba5eb54b2bdc10d10b97c_amd64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:775be225ba4a9ffdd926f27ea9e4e87afdb399768bae202ff60a483b5795c0f5_ppc64le",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:df3c4e2595a292825a9bd6137344293b67d249c710984691c3366a72a56011db_arm64",
"DevWorkspace Operator 0.39:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:dfe6c6208eaea491b40336ab3c327daa8ce0c3a24b8a9426683ca69432dcbd5a_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1168
Vulnerability from csaf_redhat - Published: 2026-01-26 09:54 - Updated: 2026-02-11 13:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cert-manager Operator for Red Hat OpenShift 1.18.1",
"title": "Topic"
},
{
"category": "general",
"text": "The cert-manager Operator for Red Hat OpenShift builds on top of Kubernetes, introducing certificate authorities\nand certificates as first-class resource types in the Kubernetes API. This makes it possible to provide\ncertificates-as-a-service to developers working within your Kubernetes cluster.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1168",
"url": "https://access.redhat.com/errata/RHSA-2026:1168"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61727",
"url": "https://access.redhat.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html",
"url": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1168.json"
}
],
"title": "Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1",
"tracking": {
"current_release_date": "2026-02-11T13:00:51+00:00",
"generator": {
"date": "2026-02-11T13:00:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1168",
"initial_release_date": "2026-01-26T09:54:57+00:00",
"revision_history": [
{
"date": "2026-01-26T09:54:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-26T09:55:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T13:00:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product": {
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cert_manager:1.18::el9"
}
}
}
],
"category": "product_family",
"name": "cert-manager operator for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3A09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23?arch=amd64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419291"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a?arch=amd64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419550"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3A63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707?arch=s390x\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419291"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece?arch=s390x\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419550"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3Af27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2?arch=ppc64le\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419291"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3Adaa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f?arch=ppc64le\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419550"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3Af1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222?arch=arm64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419291"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25?arch=arm64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769419550"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-12-03T20:01:21.730501+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418677"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/x509 package in the Go standard library. This vulnerability allows a certificate validation bypass via an excluded subdomain constraint in a certificated chain as it does not restrict the usage of wildcard SANs in the leaf certificate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to obtain a leaf certificate with a wildcard SAN (e.g., *.example.com) and the legitimate certificate policy must contain an excluded DNS name constraint (e.g., to prevent issuance for test.example.com), allowing an application using the crypto/x509 package to validate the certificate when it should have been rejected and to be vulnerable to MITM (man-in-the-middle) attacks. Additionally, the attacker does not have full control of what data can be read of modified during the attack. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "RHBZ#2418677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"category": "external",
"summary": "https://go.dev/cl/723900",
"url": "https://go.dev/cl/723900"
},
{
"category": "external",
"summary": "https://go.dev/issue/76442",
"url": "https://go.dev/issue/76442"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4175",
"url": "https://pkg.go.dev/vuln/GO-2025-4175"
}
],
"release_date": "2025-12-03T19:37:15.054000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T09:54:57+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1168"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T09:54:57+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1168"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T09:54:57+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1168"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T09:54:57+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1168"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T09:54:57+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1168"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:155383c4664ea3ed18d0f079be720ad68a5de044448a744d7579af7ff0fc7e0a_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3258027c0fb9426c9ee3567f6dc0d02b85cb661c23300b230f5b1400b43bac25_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:3bfbc3e69db31103145500f38f7a1db8e7f0462608e5a425674942606aa03ece_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:daa6b60824e45c6f31efd64b86995e23279fe310dde2f0293c762354f74d969f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:09c857f0c20721d6b447f5f567182befc1ca6157128225849117a5c830feab23_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:63f4e63f3249b6271041d31fcfbf69c3ad699d319302e8fdb2bff5e1b1418707_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f1b903ff69100fa938d6bdf4d730d35158eec905351344a246e30ef14c847222_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:f27e4637dc8b67703abb24f246ee6d59ee3b3637ce5c47ab63b7935553f419e2_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
}
]
}
RHSA-2026:2148
Vulnerability from csaf_redhat - Published: 2026-02-05 15:58 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Kiali 2.11.6 for Red Hat OpenShift Service Mesh 3.1\n\nThis update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kiali 2.11.6, for Red Hat OpenShift Service Mesh 3.1, provides observability for the service mesh by offering a visual representation of the mesh topology and metrics, helping users monitor, trace, and manage efficiently.\n\nSecurity Fix(es):\n\n* kiali-ossmc-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284 )\n\n* kiali-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284 )\n\n* kiali-rhel9: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)\n\n* kiali-ossmc-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)\n\n* kiali-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)\n\n* kiali-ossmc-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)\n\n* kiali-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2148",
"url": "https://access.redhat.com/errata/RHSA-2026:2148"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13465",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22029",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-13465",
"url": "https://access.redhat.com/security/cve/cve-2025-13465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-15284",
"url": "https://access.redhat.com/security/cve/cve-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61729",
"url": "https://access.redhat.com/security/cve/cve-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2026-22029",
"url": "https://access.redhat.com/security/cve/cve-2026-22029"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2148.json"
}
],
"title": "Red Hat Security Advisory: Kiali 2.11.6 for Red Hat OpenShift Service Mesh 3.1",
"tracking": {
"current_release_date": "2026-02-11T08:53:14+00:00",
"generator": {
"date": "2026-02-11T08:53:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2148",
"initial_release_date": "2026-02-05T15:58:24+00:00",
"revision_history": [
{
"date": "2026-02-05T15:58:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T15:58:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Service Mesh 3.1",
"product": {
"name": "Red Hat OpenShift Service Mesh 3.1",
"product_id": "Red Hat OpenShift Service Mesh 3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:3.1::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Ad6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138727"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3Ae5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140180"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Aae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138727"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3A82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140180"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Aa60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138727"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3Ab6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140180"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3A2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138727"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3A84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140180"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64 as a component of Red Hat OpenShift Service Mesh 3.1",
"product_id": "Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x as a component of Red Hat OpenShift Service Mesh 3.1",
"product_id": "Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le as a component of Red Hat OpenShift Service Mesh 3.1",
"product_id": "Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64 as a component of Red Hat OpenShift Service Mesh 3.1",
"product_id": "Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x as a component of Red Hat OpenShift Service Mesh 3.1",
"product_id": "Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le as a component of Red Hat OpenShift Service Mesh 3.1",
"product_id": "Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64 as a component of Red Hat OpenShift Service Mesh 3.1",
"product_id": "Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64 as a component of Red Hat OpenShift Service Mesh 3.1",
"product_id": "Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13465",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2026-01-21T20:01:28.774829+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431740"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Lodash. A prototype pollution vulnerability in the _.unset and _.omit functions allows an attacker able to control property paths to delete methods from global prototypes. By removing essential functionalities, this can result in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: prototype pollution in _.unset and _.omit functions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable by applications using the _.unset and _.omit functions on an object and allowing user input to determine the path of the property to be removed. This issue only allows the deletion of properties but does not allow overwriting their behavior, limiting the impact to a denial of service. Due to this reason, this vulnerability has been rated with an important severity.\n\nIn Grafana, JavaScript code runs only in the browser, while the server side is all Golang. Therefore, the worst-case scenario is a loss of functionality in the client application inside the browser. To reflect this, the CVSS availability metric and the severity of the Grafana and the Grafana-PCP component have been updated to low and moderate, respectively.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "RHBZ#2431740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
"url": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg"
}
],
"release_date": "2026-01-21T19:05:28.846000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:58:24+00:00",
"details": "See Kiali 2.11.6 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.1/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2148"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement strict input validation before passing any property paths to the _.unset and _.omit functions to block attempts to access the prototype chain. Ensure that strings like __proto__, constructor and prototype are blocked, for example.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: prototype pollution in _.unset and _.omit functions"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:58:24+00:00",
"details": "See Kiali 2.11.6 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.1/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2148"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:58:24+00:00",
"details": "See Kiali 2.11.6 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.1/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2148"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2026-22029",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-01-10T04:01:03.694749+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428412"
}
],
"notes": [
{
"category": "description",
"text": "React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs causing unintended javascript execution on the client. This is only an issue if you are creating redirect paths from untrusted content or via an open redirect. There is no impact if Declarative Mode (\u003cBrowserRouter\u003e) is being used. This issue has been patched in @remix-run/router version 1.23.2 and react-router version 7.12.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "RHBZ#2428412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22029",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22029"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx",
"url": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx"
}
],
"release_date": "2026-01-10T02:42:32.736000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:58:24+00:00",
"details": "See Kiali 2.11.6 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.1/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2148"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:82e36c47f867ced806082b44fe357e70b07c72c4258c16af5a14f56fc040b534_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:84dfc3c35747d81138244b4aa9893f9f1d21775717a4014d328eb5701d832569_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:b6b13c0381b96b286fd04e777ae6801ad61e703b5484e9105b9fa0c5de587c29_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:e5a71ca768b96c827dd2fd860cbd739d7743f1eeb89b2e4c7cc9157941683626_amd64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:2cdf4960ec57c4971d2f9ce92b07686831e6f55e24c9b1a2831470f8da05b598_s390x",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a60d01bfe3bfa2dc484f9d940b71538f0b3732cb77db883edb7a93cf42f2992e_ppc64le",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ae9d275647749b591a1ab2e4e805904b02bf8af4265793120b5eb1065759fc13_arm64",
"Red Hat OpenShift Service Mesh 3.1:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d6aaf4ab035e7dfb136fd85f82fb10852e657e8fdae2281613258009bb26250e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects"
}
]
}
RHSA-2026:2320
Vulnerability from csaf_redhat - Published: 2026-02-09 11:08 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2320",
"url": "https://access.redhat.com/errata/RHSA-2026:2320"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2320.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:17+00:00",
"generator": {
"date": "2026-02-11T08:53:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2320",
"initial_release_date": "2026-02-09T11:08:53+00:00",
"revision_history": [
{
"date": "2026-02-09T11:08:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T11:08:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.17.13-9.el9_0.src",
"product": {
"name": "golang-0:1.17.13-9.el9_0.src",
"product_id": "golang-0:1.17.13-9.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.17.13-9.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.17.13-9.el9_0.aarch64",
"product": {
"name": "golang-0:1.17.13-9.el9_0.aarch64",
"product_id": "golang-0:1.17.13-9.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.17.13-9.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.17.13-9.el9_0.aarch64",
"product": {
"name": "golang-bin-0:1.17.13-9.el9_0.aarch64",
"product_id": "golang-bin-0:1.17.13-9.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.17.13-9.el9_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.17.13-9.el9_0.ppc64le",
"product": {
"name": "golang-0:1.17.13-9.el9_0.ppc64le",
"product_id": "golang-0:1.17.13-9.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.17.13-9.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.17.13-9.el9_0.ppc64le",
"product": {
"name": "golang-bin-0:1.17.13-9.el9_0.ppc64le",
"product_id": "golang-bin-0:1.17.13-9.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.17.13-9.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.17.13-9.el9_0.x86_64",
"product": {
"name": "golang-0:1.17.13-9.el9_0.x86_64",
"product_id": "golang-0:1.17.13-9.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.17.13-9.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.17.13-9.el9_0.x86_64",
"product": {
"name": "golang-bin-0:1.17.13-9.el9_0.x86_64",
"product_id": "golang-bin-0:1.17.13-9.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.17.13-9.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.17.13-9.el9_0.x86_64",
"product": {
"name": "golang-race-0:1.17.13-9.el9_0.x86_64",
"product_id": "golang-race-0:1.17.13-9.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.17.13-9.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.17.13-9.el9_0.s390x",
"product": {
"name": "golang-0:1.17.13-9.el9_0.s390x",
"product_id": "golang-0:1.17.13-9.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.17.13-9.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.17.13-9.el9_0.s390x",
"product": {
"name": "golang-bin-0:1.17.13-9.el9_0.s390x",
"product_id": "golang-bin-0:1.17.13-9.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.17.13-9.el9_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.17.13-9.el9_0.noarch",
"product": {
"name": "golang-docs-0:1.17.13-9.el9_0.noarch",
"product_id": "golang-docs-0:1.17.13-9.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.17.13-9.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.17.13-9.el9_0.noarch",
"product": {
"name": "golang-misc-0:1.17.13-9.el9_0.noarch",
"product_id": "golang-misc-0:1.17.13-9.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.17.13-9.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.17.13-9.el9_0.noarch",
"product": {
"name": "golang-src-0:1.17.13-9.el9_0.noarch",
"product_id": "golang-src-0:1.17.13-9.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.17.13-9.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.17.13-9.el9_0.noarch",
"product": {
"name": "golang-tests-0:1.17.13-9.el9_0.noarch",
"product_id": "golang-tests-0:1.17.13-9.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.17.13-9.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.aarch64"
},
"product_reference": "golang-0:1.17.13-9.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.ppc64le"
},
"product_reference": "golang-0:1.17.13-9.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.s390x"
},
"product_reference": "golang-0:1.17.13-9.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-9.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.src"
},
"product_reference": "golang-0:1.17.13-9.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.17.13-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.x86_64"
},
"product_reference": "golang-0:1.17.13-9.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.17.13-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.aarch64"
},
"product_reference": "golang-bin-0:1.17.13-9.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.17.13-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.ppc64le"
},
"product_reference": "golang-bin-0:1.17.13-9.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.17.13-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.s390x"
},
"product_reference": "golang-bin-0:1.17.13-9.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.17.13-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.x86_64"
},
"product_reference": "golang-bin-0:1.17.13-9.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.17.13-9.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-docs-0:1.17.13-9.el9_0.noarch"
},
"product_reference": "golang-docs-0:1.17.13-9.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.17.13-9.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-misc-0:1.17.13-9.el9_0.noarch"
},
"product_reference": "golang-misc-0:1.17.13-9.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.17.13-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-race-0:1.17.13-9.el9_0.x86_64"
},
"product_reference": "golang-race-0:1.17.13-9.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.17.13-9.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-src-0:1.17.13-9.el9_0.noarch"
},
"product_reference": "golang-src-0:1.17.13-9.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.17.13-9.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:golang-tests-0:1.17.13-9.el9_0.noarch"
},
"product_reference": "golang-tests-0:1.17.13-9.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.src",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:golang-docs-0:1.17.13-9.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:golang-misc-0:1.17.13-9.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:golang-race-0:1.17.13-9.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:golang-src-0:1.17.13-9.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:golang-tests-0:1.17.13-9.el9_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T11:08:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.src",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:golang-docs-0:1.17.13-9.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:golang-misc-0:1.17.13-9.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:golang-race-0:1.17.13-9.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:golang-src-0:1.17.13-9.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:golang-tests-0:1.17.13-9.el9_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2320"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.src",
"AppStream-9.0.0.Z.E4S:golang-0:1.17.13-9.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:golang-bin-0:1.17.13-9.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:golang-docs-0:1.17.13-9.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:golang-misc-0:1.17.13-9.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:golang-race-0:1.17.13-9.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:golang-src-0:1.17.13-9.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:golang-tests-0:1.17.13-9.el9_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1715
Vulnerability from csaf_redhat - Published: 2026-02-02 13:10 - Updated: 2026-02-11 08:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-github-openprinting-ipp-usb is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables\n driverless support for USB devices capable of using IPP-over-USB protocol.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1715",
"url": "https://access.redhat.com/errata/RHSA-2026:1715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1715.json"
}
],
"title": "Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update",
"tracking": {
"current_release_date": "2026-02-11T08:52:59+00:00",
"generator": {
"date": "2026-02-11T08:52:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1715",
"initial_release_date": "2026-02-02T13:10:53+00:00",
"revision_history": [
{
"date": "2026-02-02T13:10:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-02T13:10:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:52:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-4.el10_1.src",
"product": {
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-4.el10_1.src",
"product_id": "golang-github-openprinting-ipp-usb-0:0.9.27-4.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb@0.9.27-4.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-4.el10_1.aarch64",
"product": {
"name": "ipp-usb-0:0.9.27-4.el10_1.aarch64",
"product_id": "ipp-usb-0:0.9.27-4.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-4.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.aarch64",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.aarch64",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-4.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.aarch64",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.aarch64",
"product_id": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-4.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-4.el10_1.ppc64le",
"product": {
"name": "ipp-usb-0:0.9.27-4.el10_1.ppc64le",
"product_id": "ipp-usb-0:0.9.27-4.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-4.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.ppc64le",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.ppc64le",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-4.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.ppc64le",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.ppc64le",
"product_id": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-4.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-4.el10_1.s390x",
"product": {
"name": "ipp-usb-0:0.9.27-4.el10_1.s390x",
"product_id": "ipp-usb-0:0.9.27-4.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-4.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.s390x",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.s390x",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-4.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.s390x",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.s390x",
"product_id": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-4.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-4.el10_1.x86_64",
"product": {
"name": "ipp-usb-0:0.9.27-4.el10_1.x86_64",
"product_id": "ipp-usb-0:0.9.27-4.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-4.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.x86_64",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.x86_64",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-4.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.x86_64",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.x86_64",
"product_id": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-4.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-4.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-4.el10_1.src"
},
"product_reference": "golang-github-openprinting-ipp-usb-0:0.9.27-4.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.aarch64"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.ppc64le"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.s390x"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.x86_64"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-4.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.aarch64"
},
"product_reference": "ipp-usb-0:0.9.27-4.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-4.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.ppc64le"
},
"product_reference": "ipp-usb-0:0.9.27-4.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-4.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.s390x"
},
"product_reference": "ipp-usb-0:0.9.27-4.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-4.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.x86_64"
},
"product_reference": "ipp-usb-0:0.9.27-4.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.aarch64"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.ppc64le"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.s390x"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.x86_64"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-4.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-4.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.x86_64"
],
"known_not_affected": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-4.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T13:10:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1715"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-4.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-4.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-4.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-4.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1506
Vulnerability from csaf_redhat - Published: 2026-01-28 17:34 - Updated: 2026-02-11 08:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Ansible Automation Platform 2.5\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.\n\nSecurity Fix(es):\n* automation-controller: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)\n* automation controller: AIOHTTP\u0027s HTTP Parser auto_decompress feature is vulnerable to zip bomb (CVE-2025-69223)\n* automation-controller: Django: algorithmic complexity in XML Deserializer leads to denial of service (CVE-2025-64460)\n* automation-controller: AIOHTTP HTTP Request/Response Smuggling (CVE-2025-53643)\n* python3.11-django: Django: Algorithmic complexity in XML Deserializer leads to denial of service (CVE-2025-64460)\n* python3.11-urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)\n* receptor: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)\n\nUpdates and fixes included:\n* ansible-core has been updated to 2.16.15\n* ansible-dev-tools has been updated to 26.1.0\n* ansible-lint has been updated to 26.1.0\n* ansible-navigator has been updated to 26.1.1\n* automation-controller has been updated to 4.6.25\n* automation-gateway has been updated to 2.5.20260121\n* automation-hub has been updated to 4.10.11\n* python3.11-botocore has been updated to 1.34.162\n* python3.11-django has been updated to 4.2.27\n* python3.11-galaxy-importer has been updated to 0.4.37\n* python3.11-galaxy-ng has been updated to 4.10.11\n* python3.11-requests has been updated to 2.31.0\n* python3.11-urllib3 has been updated to 2.6.3\n* receptor has been updated to 1.6.3",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1506",
"url": "https://access.redhat.com/errata/RHSA-2026:1506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5/html/release_notes/patch_releases",
"url": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5/html/release_notes/patch_releases"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5#Upgrading",
"url": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5#Upgrading"
},
{
"category": "external",
"summary": "2380000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380000"
},
{
"category": "external",
"summary": "2418366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418366"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "2427456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427456"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1506.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update",
"tracking": {
"current_release_date": "2026-02-11T08:52:49+00:00",
"generator": {
"date": "2026-02-11T08:52:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1506",
"initial_release_date": "2026-01-28T17:34:52+00:00",
"revision_history": [
{
"date": "2026-01-28T17:34:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-28T17:34:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:52:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.5::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.5::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ansible Automation Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"product": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"product_id": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-botocore@1.34.162-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-0:4.2.27-1.el9ap.src",
"product": {
"name": "python3.11-django-0:4.2.27-1.el9ap.src",
"product_id": "python3.11-django-0:4.2.27-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django@4.2.27-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-requests-0:2.31.0-3.el9ap.src",
"product": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.src",
"product_id": "python3.11-requests-0:2.31.0-3.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-requests@2.31.0-3.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"product": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"product_id": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@2.6.3-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-1.el9ap.src",
"product": {
"name": "ansible-lint-0:26.1.0-1.el9ap.src",
"product_id": "ansible-lint-0:26.1.0-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.16.15-1.el9ap.src",
"product": {
"name": "ansible-core-1:2.16.15-1.el9ap.src",
"product_id": "ansible-core-1:2.16.15-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-1.el9ap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.src",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.src",
"product_id": "receptor-0:1.6.3-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-1.el9ap.src",
"product": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.src",
"product_id": "ansible-navigator-0:26.1.1-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.src",
"product": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.src",
"product_id": "ansible-dev-tools-0:26.1.0-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-0:2.5.20260121-1.el9ap.src",
"product": {
"name": "automation-gateway-0:2.5.20260121-1.el9ap.src",
"product_id": "automation-gateway-0:2.5.20260121-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway@2.5.20260121-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el9ap.src",
"product": {
"name": "automation-controller-0:4.6.25-1.el9ap.src",
"product_id": "automation-controller-0:4.6.25-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"product": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"product_id": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-ng@4.10.11-2.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"product": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"product_id": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-importer@0.4.37-2.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-hub-0:4.10.11-1.el9ap.src",
"product": {
"name": "automation-hub-0:4.10.11-1.el9ap.src",
"product_id": "automation-hub-0:4.10.11-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-hub@4.10.11-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-botocore-0:1.34.162-1.el8ap.src",
"product": {
"name": "python3.11-botocore-0:1.34.162-1.el8ap.src",
"product_id": "python3.11-botocore-0:1.34.162-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-botocore@1.34.162-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-0:4.2.27-1.el8ap.src",
"product": {
"name": "python3.11-django-0:4.2.27-1.el8ap.src",
"product_id": "python3.11-django-0:4.2.27-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django@4.2.27-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-requests-0:2.31.0-3.el8ap.src",
"product": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.src",
"product_id": "python3.11-requests-0:2.31.0-3.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-requests@2.31.0-3.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.src",
"product": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.src",
"product_id": "python3.11-urllib3-0:2.6.3-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@2.6.3-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-1.el8ap.src",
"product": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.src",
"product_id": "ansible-navigator-0:26.1.1-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.src",
"product": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.src",
"product_id": "ansible-dev-tools-0:26.1.0-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.16.15-1.el8ap.src",
"product": {
"name": "ansible-core-1:2.16.15-1.el8ap.src",
"product_id": "ansible-core-1:2.16.15-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-1.el8ap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-0:2.5.20260121-1.el8ap.src",
"product": {
"name": "automation-gateway-0:2.5.20260121-1.el8ap.src",
"product_id": "automation-gateway-0:2.5.20260121-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway@2.5.20260121-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.src",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.src",
"product_id": "receptor-0:1.6.3-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-1.el8ap.src",
"product": {
"name": "ansible-lint-0:26.1.0-1.el8ap.src",
"product_id": "ansible-lint-0:26.1.0-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el8ap.src",
"product": {
"name": "automation-controller-0:4.6.25-1.el8ap.src",
"product_id": "automation-controller-0:4.6.25-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"product": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"product_id": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-ng@4.10.11-2.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"product": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"product_id": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-importer@0.4.37-2.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-hub-0:4.10.11-1.el8ap.src",
"product": {
"name": "automation-hub-0:4.10.11-1.el8ap.src",
"product_id": "automation-hub-0:4.10.11-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-hub@4.10.11-1.el8ap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"product": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"product_id": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-botocore@1.34.162-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-0:4.2.27-1.el9ap.noarch",
"product": {
"name": "python3.11-django-0:4.2.27-1.el9ap.noarch",
"product_id": "python3.11-django-0:4.2.27-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django@4.2.27-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"product": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"product_id": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-requests@2.31.0-3.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"product": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"product_id": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@2.6.3-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"product": {
"name": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"product_id": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.16.15-1.el9ap.noarch",
"product": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch",
"product_id": "ansible-core-1:2.16.15-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-1.el9ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "ansible-test-1:2.16.15-1.el9ap.noarch",
"product": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch",
"product_id": "ansible-test-1:2.16.15-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-test@2.16.15-1.el9ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "receptorctl-0:1.6.3-1.el9ap.noarch",
"product": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch",
"product_id": "receptorctl-0:1.6.3-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptorctl@1.6.3-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"product": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"product_id": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"product": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"product_id": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools%2Bserver@26.1.0-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"product": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"product_id": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"product": {
"name": "automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"product_id": "automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway@2.5.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"product": {
"name": "automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"product_id": "automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway-config@2.5.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"product": {
"name": "automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"product_id": "automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway-server@2.5.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"product": {
"name": "automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"product_id": "automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-cli@4.6.25-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-server-0:4.6.25-1.el9ap.noarch",
"product": {
"name": "automation-controller-server-0:4.6.25-1.el9ap.noarch",
"product_id": "automation-controller-server-0:4.6.25-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-server@4.6.25-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"product": {
"name": "automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"product_id": "automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-ui@4.6.25-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"product": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"product_id": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-ng@4.10.11-2.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"product": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"product_id": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-importer@0.4.37-2.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-hub-0:4.10.11-1.el9ap.noarch",
"product": {
"name": "automation-hub-0:4.10.11-1.el9ap.noarch",
"product_id": "automation-hub-0:4.10.11-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-hub@4.10.11-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"product": {
"name": "python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"product_id": "python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-botocore@1.34.162-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-0:4.2.27-1.el8ap.noarch",
"product": {
"name": "python3.11-django-0:4.2.27-1.el8ap.noarch",
"product_id": "python3.11-django-0:4.2.27-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django@4.2.27-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-requests-0:2.31.0-3.el8ap.noarch",
"product": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.noarch",
"product_id": "python3.11-requests-0:2.31.0-3.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-requests@2.31.0-3.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"product": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"product_id": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@2.6.3-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"product": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"product_id": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"product": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"product_id": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools%2Bserver@26.1.0-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"product": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"product_id": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.16.15-1.el8ap.noarch",
"product": {
"name": "ansible-core-1:2.16.15-1.el8ap.noarch",
"product_id": "ansible-core-1:2.16.15-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-1.el8ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "ansible-test-1:2.16.15-1.el8ap.noarch",
"product": {
"name": "ansible-test-1:2.16.15-1.el8ap.noarch",
"product_id": "ansible-test-1:2.16.15-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-test@2.16.15-1.el8ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"product": {
"name": "automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"product_id": "automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway@2.5.20260121-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"product": {
"name": "automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"product_id": "automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway-config@2.5.20260121-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"product": {
"name": "automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"product_id": "automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway-server@2.5.20260121-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "receptorctl-0:1.6.3-1.el8ap.noarch",
"product": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch",
"product_id": "receptorctl-0:1.6.3-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptorctl@1.6.3-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"product": {
"name": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"product_id": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"product": {
"name": "automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"product_id": "automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-cli@4.6.25-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-server-0:4.6.25-1.el8ap.noarch",
"product": {
"name": "automation-controller-server-0:4.6.25-1.el8ap.noarch",
"product_id": "automation-controller-server-0:4.6.25-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-server@4.6.25-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"product": {
"name": "automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"product_id": "automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-ui@4.6.25-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"product": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"product_id": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-ng@4.10.11-2.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"product": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"product_id": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-importer@0.4.37-2.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-hub-0:4.10.11-1.el8ap.noarch",
"product": {
"name": "automation-hub-0:4.10.11-1.el8ap.noarch",
"product_id": "automation-hub-0:4.10.11-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-hub@4.10.11-1.el8ap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.x86_64",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64",
"product_id": "receptor-0:1.6.3-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el9ap.x86_64",
"product": {
"name": "automation-controller-0:4.6.25-1.el9ap.x86_64",
"product_id": "automation-controller-0:4.6.25-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.x86_64",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64",
"product_id": "receptor-0:1.6.3-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el8ap.x86_64",
"product": {
"name": "automation-controller-0:4.6.25-1.el8ap.x86_64",
"product_id": "automation-controller-0:4.6.25-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el8ap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.ppc64le",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le",
"product_id": "receptor-0:1.6.3-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-0:4.6.25-1.el9ap.ppc64le",
"product_id": "automation-controller-0:4.6.25-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.ppc64le",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le",
"product_id": "receptor-0:1.6.3-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el8ap.ppc64le",
"product": {
"name": "automation-controller-0:4.6.25-1.el8ap.ppc64le",
"product_id": "automation-controller-0:4.6.25-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el8ap?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.s390x",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.s390x",
"product_id": "receptor-0:1.6.3-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el9ap.s390x",
"product": {
"name": "automation-controller-0:4.6.25-1.el9ap.s390x",
"product_id": "automation-controller-0:4.6.25-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.s390x",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.s390x",
"product_id": "receptor-0:1.6.3-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el8ap.s390x",
"product": {
"name": "automation-controller-0:4.6.25-1.el8ap.s390x",
"product_id": "automation-controller-0:4.6.25-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el8ap?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.aarch64",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64",
"product_id": "receptor-0:1.6.3-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el9ap.aarch64",
"product": {
"name": "automation-controller-0:4.6.25-1.el9ap.aarch64",
"product_id": "automation-controller-0:4.6.25-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.aarch64",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64",
"product_id": "receptor-0:1.6.3-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el8ap.aarch64",
"product": {
"name": "automation-controller-0:4.6.25-1.el8ap.aarch64",
"product_id": "automation-controller-0:4.6.25-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el8ap?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-server-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch"
},
"product_reference": "python3.11-django-0:4.2.27-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src"
},
"product_reference": "python3.11-django-0:4.2.27-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-server-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-0:2.5.20260121-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch"
},
"product_reference": "automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-0:2.5.20260121-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src"
},
"product_reference": "automation-gateway-0:2.5.20260121-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-config-0:2.5.20260121-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch"
},
"product_reference": "automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-server-0:2.5.20260121-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch"
},
"product_reference": "automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-hub-0:4.10.11-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch"
},
"product_reference": "automation-hub-0:4.10.11-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-hub-0:4.10.11-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src"
},
"product_reference": "automation-hub-0:4.10.11-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-botocore-0:1.34.162-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch"
},
"product_reference": "python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-botocore-0:1.34.162-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src"
},
"product_reference": "python3.11-botocore-0:1.34.162-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch"
},
"product_reference": "python3.11-django-0:4.2.27-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src"
},
"product_reference": "python3.11-django-0:4.2.27-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch"
},
"product_reference": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src"
},
"product_reference": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch"
},
"product_reference": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src"
},
"product_reference": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-server-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch"
},
"product_reference": "python3.11-django-0:4.2.27-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src"
},
"product_reference": "python3.11-django-0:4.2.27-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-server-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-0:2.5.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch"
},
"product_reference": "automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-0:2.5.20260121-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src"
},
"product_reference": "automation-gateway-0:2.5.20260121-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-config-0:2.5.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch"
},
"product_reference": "automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-server-0:2.5.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch"
},
"product_reference": "automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-hub-0:4.10.11-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch"
},
"product_reference": "automation-hub-0:4.10.11-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-hub-0:4.10.11-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src"
},
"product_reference": "automation-hub-0:4.10.11-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch"
},
"product_reference": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src"
},
"product_reference": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch"
},
"product_reference": "python3.11-django-0:4.2.27-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src"
},
"product_reference": "python3.11-django-0:4.2.27-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch"
},
"product_reference": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src"
},
"product_reference": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch"
},
"product_reference": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src"
},
"product_reference": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53643",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2025-07-14T21:00:57.122280+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380000"
}
],
"notes": [
{
"category": "description",
"text": "A request smuggling flaw was found in the aiohttp python library. If a pure Python version of aiohttp is installed, without the usual C extensions, for example, or if AIOHTTP_NO_EXTENSIONS is enabled, an attacker can execute a request smuggling attack to bypass certain firewalls or proxy protections.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: AIOHTTP HTTP Request/Response Smuggling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53643"
},
{
"category": "external",
"summary": "RHBZ#2380000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380000"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53643",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53643"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a",
"url": "https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-9548-qrrj-x5pj",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-9548-qrrj-x5pj"
}
],
"release_date": "2025-07-14T20:17:18.247000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T17:34:52+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1506"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "aiohttp: AIOHTTP HTTP Request/Response Smuggling"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T17:34:52+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1506"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-64460",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2025-12-02T16:01:05.300335+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418366"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Django. This vulnerability allows a remote attacker to cause a potential denial-of-service (DoS) attack triggering Central Processing Unit (CPU) and memory exhaustion via specially crafted Extensible Markup Language (XML) input processed by the XML Deserializer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Django: Django: Algorithmic complexity in XML Deserializer leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that process XML input using Django\u0027s XML Deserializer, including Red Hat Ansible Automation Platform, Red Hat OpenStack Platform, and OpenShift Service Mesh. A remote attacker can exploit this flaw by providing specially crafted XML, leading to a denial-of-service due to CPU and memory exhaustion.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64460"
},
{
"category": "external",
"summary": "RHBZ#2418366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64460"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460"
},
{
"category": "external",
"summary": "https://docs.djangoproject.com/en/dev/releases/security/",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"category": "external",
"summary": "https://groups.google.com/g/django-announce",
"url": "https://groups.google.com/g/django-announce"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/",
"url": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/"
}
],
"release_date": "2025-12-02T15:15:34.451000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T17:34:52+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1506"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Django: Django: Algorithmic complexity in XML Deserializer leads to denial of service"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T17:34:52+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1506"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-69223",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-06T20:01:19.831548+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427456"
}
],
"notes": [
{
"category": "description",
"text": "AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow a zip bomb to be used to execute a DoS against the AIOHTTP server. An attacker may be able to send a compressed request that when decompressed by AIOHTTP could exhaust the host\u0027s memory. This issue is fixed in version 3.13.3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: AIOHTTP\u0027s HTTP Parser auto_decompress feature is vulnerable to zip bomb",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69223"
},
{
"category": "external",
"summary": "RHBZ#2427456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69223"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/2b920c39002cee0ec5b402581779bbaaf7c9138a",
"url": "https://github.com/aio-libs/aiohttp/commit/2b920c39002cee0ec5b402581779bbaaf7c9138a"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6mq8-rvhq-8wgg",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6mq8-rvhq-8wgg"
}
],
"release_date": "2026-01-05T22:00:17.715000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T17:34:52+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1506"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "aiohttp: AIOHTTP\u0027s HTTP Parser auto_decompress feature is vulnerable to zip bomb"
}
]
}
RHSA-2026:1344
Vulnerability from csaf_redhat - Published: 2026-01-27 11:37 - Updated: 2026-02-11 08:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1344",
"url": "https://access.redhat.com/errata/RHSA-2026:1344"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1344.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-02-11T08:52:50+00:00",
"generator": {
"date": "2026-02-11T08:52:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1344",
"initial_release_date": "2026-01-27T11:37:52+00:00",
"revision_history": [
{
"date": "2026-01-27T11:37:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-27T11:37:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:52:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-27.el8_10.x86_64",
"product": {
"name": "grafana-0:9.2.10-27.el8_10.x86_64",
"product_id": "grafana-0:9.2.10-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-27.el8_10.x86_64",
"product": {
"name": "grafana-selinux-0:9.2.10-27.el8_10.x86_64",
"product_id": "grafana-selinux-0:9.2.10-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-27.el8_10.x86_64",
"product": {
"name": "grafana-debugsource-0:9.2.10-27.el8_10.x86_64",
"product_id": "grafana-debugsource-0:9.2.10-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.x86_64",
"product": {
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.x86_64",
"product_id": "grafana-debuginfo-0:9.2.10-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-27.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-27.el8_10.s390x",
"product": {
"name": "grafana-0:9.2.10-27.el8_10.s390x",
"product_id": "grafana-0:9.2.10-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-27.el8_10.s390x",
"product": {
"name": "grafana-selinux-0:9.2.10-27.el8_10.s390x",
"product_id": "grafana-selinux-0:9.2.10-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-27.el8_10.s390x",
"product": {
"name": "grafana-debugsource-0:9.2.10-27.el8_10.s390x",
"product_id": "grafana-debugsource-0:9.2.10-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.s390x",
"product": {
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.s390x",
"product_id": "grafana-debuginfo-0:9.2.10-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-27.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-27.el8_10.src",
"product": {
"name": "grafana-0:9.2.10-27.el8_10.src",
"product_id": "grafana-0:9.2.10-27.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-27.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-27.el8_10.aarch64",
"product": {
"name": "grafana-0:9.2.10-27.el8_10.aarch64",
"product_id": "grafana-0:9.2.10-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-27.el8_10.aarch64",
"product": {
"name": "grafana-selinux-0:9.2.10-27.el8_10.aarch64",
"product_id": "grafana-selinux-0:9.2.10-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-27.el8_10.aarch64",
"product": {
"name": "grafana-debugsource-0:9.2.10-27.el8_10.aarch64",
"product_id": "grafana-debugsource-0:9.2.10-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.aarch64",
"product": {
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.aarch64",
"product_id": "grafana-debuginfo-0:9.2.10-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-27.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-27.el8_10.ppc64le",
"product": {
"name": "grafana-0:9.2.10-27.el8_10.ppc64le",
"product_id": "grafana-0:9.2.10-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-27.el8_10.ppc64le",
"product": {
"name": "grafana-selinux-0:9.2.10-27.el8_10.ppc64le",
"product_id": "grafana-selinux-0:9.2.10-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-27.el8_10.ppc64le",
"product": {
"name": "grafana-debugsource-0:9.2.10-27.el8_10.ppc64le",
"product_id": "grafana-debugsource-0:9.2.10-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.ppc64le",
"product": {
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.ppc64le",
"product_id": "grafana-debuginfo-0:9.2.10-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-27.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.aarch64"
},
"product_reference": "grafana-0:9.2.10-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.ppc64le"
},
"product_reference": "grafana-0:9.2.10-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.s390x"
},
"product_reference": "grafana-0:9.2.10-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-27.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.src"
},
"product_reference": "grafana-0:9.2.10-27.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.x86_64"
},
"product_reference": "grafana-0:9.2.10-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.aarch64"
},
"product_reference": "grafana-debuginfo-0:9.2.10-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.ppc64le"
},
"product_reference": "grafana-debuginfo-0:9.2.10-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.s390x"
},
"product_reference": "grafana-debuginfo-0:9.2.10-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.x86_64"
},
"product_reference": "grafana-debuginfo-0:9.2.10-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.aarch64"
},
"product_reference": "grafana-debugsource-0:9.2.10-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.ppc64le"
},
"product_reference": "grafana-debugsource-0:9.2.10-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.s390x"
},
"product_reference": "grafana-debugsource-0:9.2.10-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.x86_64"
},
"product_reference": "grafana-debugsource-0:9.2.10-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.aarch64"
},
"product_reference": "grafana-selinux-0:9.2.10-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.ppc64le"
},
"product_reference": "grafana-selinux-0:9.2.10-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.s390x"
},
"product_reference": "grafana-selinux-0:9.2.10-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.x86_64"
},
"product_reference": "grafana-selinux-0:9.2.10-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-27T11:37:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1344"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-27.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:0990
Vulnerability from csaf_redhat - Published: 2026-01-22 11:34 - Updated: 2026-02-11 13:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cert-manager Operator for Red Hat OpenShift 1.18.1",
"title": "Topic"
},
{
"category": "general",
"text": "The cert-manager Operator for Red Hat OpenShift builds on top of Kubernetes, introducing certificate authorities\nand certificates as first-class resource types in the Kubernetes API. This makes it possible to provide\ncertificates-as-a-service to developers working within your Kubernetes cluster.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0990",
"url": "https://access.redhat.com/errata/RHSA-2026:0990"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61727",
"url": "https://access.redhat.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html",
"url": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0990.json"
}
],
"title": "Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1",
"tracking": {
"current_release_date": "2026-02-11T13:00:41+00:00",
"generator": {
"date": "2026-02-11T13:00:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:0990",
"initial_release_date": "2026-01-22T11:34:41+00:00",
"revision_history": [
{
"date": "2026-01-22T11:34:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-22T11:34:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T13:00:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product": {
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cert_manager:1.18::el9"
}
}
}
],
"category": "product_family",
"name": "cert-manager operator for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3A3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33?arch=amd64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985286"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e?arch=amd64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985612"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3A1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737?arch=s390x\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985286"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc?arch=s390x\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985612"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3A5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5?arch=ppc64le\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985286"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f?arch=ppc64le\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985612"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3A28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923?arch=arm64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985286"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3Acbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459?arch=arm64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1768985612"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-12-03T20:01:21.730501+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418677"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/x509 package in the Go standard library. This vulnerability allows a certificate validation bypass via an excluded subdomain constraint in a certificated chain as it does not restrict the usage of wildcard SANs in the leaf certificate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to obtain a leaf certificate with a wildcard SAN (e.g., *.example.com) and the legitimate certificate policy must contain an excluded DNS name constraint (e.g., to prevent issuance for test.example.com), allowing an application using the crypto/x509 package to validate the certificate when it should have been rejected and to be vulnerable to MITM (man-in-the-middle) attacks. Additionally, the attacker does not have full control of what data can be read of modified during the attack. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "RHBZ#2418677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"category": "external",
"summary": "https://go.dev/cl/723900",
"url": "https://go.dev/cl/723900"
},
{
"category": "external",
"summary": "https://go.dev/issue/76442",
"url": "https://go.dev/issue/76442"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4175",
"url": "https://pkg.go.dev/vuln/GO-2025-4175"
}
],
"release_date": "2025-12-03T19:37:15.054000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T11:34:41+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0990"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T11:34:41+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0990"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T11:34:41+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0990"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T11:34:41+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0990"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T11:34:41+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0990"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:0a08f25c01d26cf0833fb5fd2e2b77e11b7ee92016c6e039594180262496212f_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:399c99087dd8b4b6f790dddaa6cd284a1aa459eb641c5b788e1b926e9d0f6a7e_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:41f1f7807a760ba804e71971810977dc63010a17ccd74b607aaf01fb28386cbc_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:cbfb1c86b988a242eb25774b3f1f32d1f29795335c6e4e49f6b3b0065c5af459_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1f62aebd5bbdd5809116b4575adfec3d51c24e48ce188aaf3b06dd26826bc737_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:28b8e7c5383ce99ef0589242494e9cbb30d0ef94ee16a54c191ab0b434128923_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:3ca7fb070c05efc25fe53af6fc922875ecb9d11943d3c243b2840d7ca2b1aa33_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5c7fc6f10f7d9f5299ca42feadd98da0ce9d53835e89f8690a74ccd62e20dde5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
}
]
}
RHSA-2026:1814
Vulnerability from csaf_redhat - Published: 2026-02-03 12:29 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1814",
"url": "https://access.redhat.com/errata/RHSA-2026:1814"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1814.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:06+00:00",
"generator": {
"date": "2026-02-11T08:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1814",
"initial_release_date": "2026-02-03T12:29:57+00:00",
"revision_history": [
{
"date": "2026-02-03T12:29:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-03T12:29:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el10_0.aarch64",
"product": {
"name": "go-toolset-0:1.25.5-1.el10_0.aarch64",
"product_id": "go-toolset-0:1.25.5-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el10_0.aarch64",
"product": {
"name": "golang-0:1.25.5-1.el10_0.aarch64",
"product_id": "golang-0:1.25.5-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el10_0.aarch64",
"product": {
"name": "golang-bin-0:1.25.5-1.el10_0.aarch64",
"product_id": "golang-bin-0:1.25.5-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el10_0.aarch64",
"product": {
"name": "golang-race-0:1.25.5-1.el10_0.aarch64",
"product_id": "golang-race-0:1.25.5-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el10_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el10_0.ppc64le",
"product": {
"name": "go-toolset-0:1.25.5-1.el10_0.ppc64le",
"product_id": "go-toolset-0:1.25.5-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el10_0.ppc64le",
"product": {
"name": "golang-0:1.25.5-1.el10_0.ppc64le",
"product_id": "golang-0:1.25.5-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el10_0.ppc64le",
"product": {
"name": "golang-bin-0:1.25.5-1.el10_0.ppc64le",
"product_id": "golang-bin-0:1.25.5-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el10_0.ppc64le",
"product": {
"name": "golang-race-0:1.25.5-1.el10_0.ppc64le",
"product_id": "golang-race-0:1.25.5-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el10_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el10_0.x86_64",
"product": {
"name": "go-toolset-0:1.25.5-1.el10_0.x86_64",
"product_id": "go-toolset-0:1.25.5-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el10_0.x86_64",
"product": {
"name": "golang-0:1.25.5-1.el10_0.x86_64",
"product_id": "golang-0:1.25.5-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el10_0.x86_64",
"product": {
"name": "golang-bin-0:1.25.5-1.el10_0.x86_64",
"product_id": "golang-bin-0:1.25.5-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el10_0.x86_64",
"product": {
"name": "golang-race-0:1.25.5-1.el10_0.x86_64",
"product_id": "golang-race-0:1.25.5-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el10_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el10_0.s390x",
"product": {
"name": "go-toolset-0:1.25.5-1.el10_0.s390x",
"product_id": "go-toolset-0:1.25.5-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el10_0.s390x",
"product": {
"name": "golang-0:1.25.5-1.el10_0.s390x",
"product_id": "golang-0:1.25.5-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el10_0.s390x",
"product": {
"name": "golang-bin-0:1.25.5-1.el10_0.s390x",
"product_id": "golang-bin-0:1.25.5-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el10_0.s390x",
"product": {
"name": "golang-race-0:1.25.5-1.el10_0.s390x",
"product_id": "golang-race-0:1.25.5-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el10_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el10_0.src",
"product": {
"name": "golang-0:1.25.5-1.el10_0.src",
"product_id": "golang-0:1.25.5-1.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el10_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.5-1.el10_0.noarch",
"product": {
"name": "golang-docs-0:1.25.5-1.el10_0.noarch",
"product_id": "golang-docs-0:1.25.5-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.5-1.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.5-1.el10_0.noarch",
"product": {
"name": "golang-misc-0:1.25.5-1.el10_0.noarch",
"product_id": "golang-misc-0:1.25.5-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.5-1.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.5-1.el10_0.noarch",
"product": {
"name": "golang-src-0:1.25.5-1.el10_0.noarch",
"product_id": "golang-src-0:1.25.5-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.5-1.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.5-1.el10_0.noarch",
"product": {
"name": "golang-tests-0:1.25.5-1.el10_0.noarch",
"product_id": "golang-tests-0:1.25.5-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.5-1.el10_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.aarch64"
},
"product_reference": "go-toolset-0:1.25.5-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.ppc64le"
},
"product_reference": "go-toolset-0:1.25.5-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.s390x"
},
"product_reference": "go-toolset-0:1.25.5-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.x86_64"
},
"product_reference": "go-toolset-0:1.25.5-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.aarch64"
},
"product_reference": "golang-0:1.25.5-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.ppc64le"
},
"product_reference": "golang-0:1.25.5-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.s390x"
},
"product_reference": "golang-0:1.25.5-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el10_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.src"
},
"product_reference": "golang-0:1.25.5-1.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.x86_64"
},
"product_reference": "golang-0:1.25.5-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.aarch64"
},
"product_reference": "golang-bin-0:1.25.5-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.ppc64le"
},
"product_reference": "golang-bin-0:1.25.5-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.s390x"
},
"product_reference": "golang-bin-0:1.25.5-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.x86_64"
},
"product_reference": "golang-bin-0:1.25.5-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.5-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-docs-0:1.25.5-1.el10_0.noarch"
},
"product_reference": "golang-docs-0:1.25.5-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.5-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-misc-0:1.25.5-1.el10_0.noarch"
},
"product_reference": "golang-misc-0:1.25.5-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.aarch64"
},
"product_reference": "golang-race-0:1.25.5-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.ppc64le"
},
"product_reference": "golang-race-0:1.25.5-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.s390x"
},
"product_reference": "golang-race-0:1.25.5-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.x86_64"
},
"product_reference": "golang-race-0:1.25.5-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.5-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-src-0:1.25.5-1.el10_0.noarch"
},
"product_reference": "golang-src-0:1.25.5-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.5-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-tests-0:1.25.5-1.el10_0.noarch"
},
"product_reference": "golang-tests-0:1.25.5-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.5-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.5-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.5-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.5-1.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-03T12:29:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.5-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.5-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.5-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.5-1.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1814"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.5-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.5-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.5-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.5-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.5-1.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1249
Vulnerability from csaf_redhat - Published: 2026-01-26 19:58 - Updated: 2026-02-11 08:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Ansible Automation Platform 2.6\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.\n\nSecurity Fix(es):\n\n* automation-controller: AIOHTTP HTTP Request/Response Smuggling (CVE-2025-53643)\n* automation-controller: AIOHTTP\u0027s HTTP Parser auto_decompress feature is vulnerable to zip bomb (CVE-2025-69223)\n* automation-controller: Django: Algorithmic complexity in XML Deserializer leads to denial of service (CVE-2025-64460)\n* automation-controller: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)\n* python3.11-django: Algorithmic complexity in XML Deserializer leads to denial of service (CVE-2025-64460)\n* python3.11-protobuf: Unbounded recursion in Python Protobuf (CVE-2025-4565)\n* python3.11-urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)\n* receptor: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nUpdates and fixes included:\n\nAutomation Platform\n* Reduced cognitive complexity in _sync_user_superuser_flag (AAP-62771)\n* The FEATURE_GATEWAY_IPV6_USAGE_ENABLED feature flag has been removed and IPv6 support is enabled by default (AAP-61805)\n* Fixed an issue preventing gateway from working in a pure IPv4 single stack environment when IPv6 is enabled (AAP-60478)\n* Added dedicated aap.auth_audit logger with specialized formatters and handlers (AAP-60364)\n* Introduced new logs for authentication events (AAP-60364)\n* automation-gateway has been updated to 2.6.20260121\n* python3.11-django-ansible-base has been updated to 2.6.20260121\n\nAutomation Platform UI\n* Page titles now reflect the current page content (AAP-61754)\n* Allow full search in resource dropdowns (AAP-57712)\n* Fixed an issue that occasionally showed a bad request status when navigating between different pages (AAP-56701)\n* Fixed filtering by name in Collections page (AAP-56529)\n* Fixed clear/browse button behavior in Client Certificate and Client Key (AAP-55296)\n* Fixed an issue where a Rulebook Activation in workers offline status could not be disabled or deleted (AAP-52714)\n* Fixed an issue where workflow job templates node credentials are missing after save for job template nodes that have a default credential that is promptable (AAP-52638)\n* Fixed an issue where the gateway UI reset the order of an auth mapping when the entity was edited by the user (AAP-52258)\n* Improves labels and descriptions for Authenticator Mappings details (AAP-51295)\n* Resolved an issue where controller unavailability rendered the entire AAP UI inaccessible (AAP-50106)\n* Fixed descriptions for Remotes and Remote Registries (AAP-49838)\n* Survey textarea \"Default Answer\" field now properly accepts newlines when pressing Enter (AAP-49820)\n* Fixed review page on Workflow Approval Nodes (AAP-49433)\n* Fixed editing of \"Days of data to keep\" value in management job schedules (AAP-48972)\n* Editing and saving credentials that use external credential lookup plugins (such as CyberArk) no longer fails with an error message (AAP-44813)\n* Fixed an issue where the SAML Service Provider extra configuration data field could not be cleared in the UI, as it would automatically reset to the default value (AAP-43661)\n* Resolved an issue where ad-hoc commands failed with a \"Bad Request\" error when using credentials configured with \"Prompt on launch\" for password fields (AAP-43603)\n* Updated modal warning message and layout when enabling a copied Rulebook Activation (AAP-42574)\n* automation-platform-ui has been updated to 2.6.5\n\nAutomation controller\n* Added runtime feature flags (AAP-62686)\n* automation-controller has been updated to 4.7.8\n* receptor has been updated to 1.6.3\n\nAutomation hub\n* Autocomplete attribute added to the Automation Hub API password field (AAP-59910)\n* automation-hub has been updated to 4.11.5\n* python3.11-galaxy-importer has been updated to 0.4.37\n* python3.11-galaxy-ng has been updated to 4.11.5\n* python3.11-pulpcore has been updated to 3.49.49\n\nEvent-Driven Ansible\n* Added x-ai-description field to the activation PATCH method (AAP-61969)\n* automation-eda-controller has been updated to 1.2.4\n\nContainer-based Ansible Automation Platform\n* Added lTLS support to lightspeed chatbot service (AAP-60900)\n* system-prompt was optimized for granite and openai models (AAP-60898)\n* Added ipv6 support (AAP-60532)\n* Fixed an issue where the pcp uninstall step was failing for the Ansible MCP nodes (AAP-60517)\n* containerized installer setup has been updated to 2.6-5\n\nRPM-based Ansible Automation Platform\n* ansible-automation-platform-installer and installer setup have been updated to 2.6-4\n\nAdditional changes\n* ansible-core has been updated to 2.16.15\n* ansible-dev-tools has been updated to 26.1.0\n* ansible-lint has been updated to 26.1.0\n* ansible-navigator has been updated to 26.1.1\n* python3.11-botocore has been updated to 1.34.162\n* python3.11-django has been updated to 4.2.27\n* python3.11-protobuf has been updated to 4.25.8\n* python3.11-requests has been updated to 2.31.0\n* python3.11-urllib3 has been updated to 2.6.3",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1249",
"url": "https://access.redhat.com/errata/RHSA-2026:1249"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.6/html/release_notes/patch_releases",
"url": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.6/html/release_notes/patch_releases"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.6#Upgrade",
"url": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.6#Upgrade"
},
{
"category": "external",
"summary": "2373016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373016"
},
{
"category": "external",
"summary": "2380000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380000"
},
{
"category": "external",
"summary": "2418366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418366"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "2427456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427456"
},
{
"category": "external",
"summary": "AAP-60364",
"url": "https://issues.redhat.com/browse/AAP-60364"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1249.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update",
"tracking": {
"current_release_date": "2026-02-11T08:52:38+00:00",
"generator": {
"date": "2026-02-11T08:52:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1249",
"initial_release_date": "2026-01-26T19:58:10+00:00",
"revision_history": [
{
"date": "2026-01-26T19:58:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-26T19:58:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:52:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.6::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.6::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.6::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product": {
"name": "Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.6::el10"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product": {
"name": "Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.6::el10"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ansible Automation Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-django-0:4.2.27-2.el9ap.src",
"product": {
"name": "python3.11-django-0:4.2.27-2.el9ap.src",
"product_id": "python3.11-django-0:4.2.27-2.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django@4.2.27-2.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"product": {
"name": "python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"product_id": "python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-pulpcore@3.49.49-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.src",
"product": {
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.src",
"product_id": "python3.11-protobuf-0:4.25.8-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf@4.25.8-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"product": {
"name": "ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"product_id": "ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-automation-platform-installer@2.6-4.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-2.el9ap.src",
"product": {
"name": "ansible-navigator-0:26.1.1-2.el9ap.src",
"product_id": "ansible-navigator-0:26.1.1-2.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-2.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-hub-0:4.11.5-1.el9ap.src",
"product": {
"name": "automation-hub-0:4.11.5-1.el9ap.src",
"product_id": "automation-hub-0:4.11.5-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-hub@4.11.5-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-2.el9ap.src",
"product": {
"name": "ansible-dev-tools-0:26.1.0-2.el9ap.src",
"product_id": "ansible-dev-tools-0:26.1.0-2.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-2.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-2.el9ap.src",
"product": {
"name": "ansible-lint-0:26.1.0-2.el9ap.src",
"product_id": "ansible-lint-0:26.1.0-2.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-2.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-0:2.6.20260121-1.el9ap.src",
"product": {
"name": "automation-gateway-0:2.6.20260121-1.el9ap.src",
"product_id": "automation-gateway-0:2.6.20260121-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway@2.6.20260121-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-eda-controller-0:1.2.4-1.el9ap.src",
"product": {
"name": "automation-eda-controller-0:1.2.4-1.el9ap.src",
"product_id": "automation-eda-controller-0:1.2.4-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-eda-controller@1.2.4-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"product": {
"name": "python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"product_id": "python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base@2.6.20260121-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-platform-ui-0:2.6.5-1.el9ap.src",
"product": {
"name": "automation-platform-ui-0:2.6.5-1.el9ap.src",
"product_id": "automation-platform-ui-0:2.6.5-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-platform-ui@2.6.5-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"product": {
"name": "python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"product_id": "python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-ng@4.11.5-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-2.el9ap.src",
"product": {
"name": "receptor-0:1.6.3-2.el9ap.src",
"product_id": "receptor-0:1.6.3-2.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-2.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.7.8-1.el9ap.src",
"product": {
"name": "automation-controller-0:4.7.8-1.el9ap.src",
"product_id": "automation-controller-0:4.7.8-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.7.8-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"product": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"product_id": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-botocore@1.34.162-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-requests-0:2.31.0-3.el9ap.src",
"product": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.src",
"product_id": "python3.11-requests-0:2.31.0-3.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-requests@2.31.0-3.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"product": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"product_id": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@2.6.3-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.16.15-1.el9ap.src",
"product": {
"name": "ansible-core-1:2.16.15-1.el9ap.src",
"product_id": "ansible-core-1:2.16.15-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-1.el9ap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"product": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"product_id": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-importer@0.4.37-2.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-2.el10ap.src",
"product": {
"name": "ansible-dev-tools-0:26.1.0-2.el10ap.src",
"product_id": "ansible-dev-tools-0:26.1.0-2.el10ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-2.el10ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-2.el10ap.src",
"product": {
"name": "ansible-lint-0:26.1.0-2.el10ap.src",
"product_id": "ansible-lint-0:26.1.0-2.el10ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-2.el10ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-2.el10ap.src",
"product": {
"name": "ansible-navigator-0:26.1.1-2.el10ap.src",
"product_id": "ansible-navigator-0:26.1.1-2.el10ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-2.el10ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-django-0:4.2.27-2.el10ap.src",
"product": {
"name": "python-django-0:4.2.27-2.el10ap.src",
"product_id": "python-django-0:4.2.27-2.el10ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-django@4.2.27-2.el10ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-core-2:2.16.15-2.el10ap.src",
"product": {
"name": "ansible-core-2:2.16.15-2.el10ap.src",
"product_id": "ansible-core-2:2.16.15-2.el10ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-2.el10ap?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-2.el10ap.src",
"product": {
"name": "receptor-0:1.6.3-2.el10ap.src",
"product_id": "receptor-0:1.6.3-2.el10ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-2.el10ap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-django-0:4.2.27-2.el9ap.noarch",
"product": {
"name": "python3.11-django-0:4.2.27-2.el9ap.noarch",
"product_id": "python3.11-django-0:4.2.27-2.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django@4.2.27-2.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"product": {
"name": "python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"product_id": "python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-pulpcore@3.49.49-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"product": {
"name": "ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"product_id": "ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-automation-platform-installer@2.6-4.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-2.el9ap.noarch",
"product": {
"name": "ansible-navigator-0:26.1.1-2.el9ap.noarch",
"product_id": "ansible-navigator-0:26.1.1-2.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-2.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-hub-0:4.11.5-1.el9ap.noarch",
"product": {
"name": "automation-hub-0:4.11.5-1.el9ap.noarch",
"product_id": "automation-hub-0:4.11.5-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-hub@4.11.5-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"product": {
"name": "ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"product_id": "ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools%2Bserver@26.1.0-2.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"product": {
"name": "ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"product_id": "ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-2.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-2.el9ap.noarch",
"product": {
"name": "ansible-lint-0:26.1.0-2.el9ap.noarch",
"product_id": "ansible-lint-0:26.1.0-2.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-2.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"product_id": "automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"product_id": "automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway-config@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"product_id": "automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway-server@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"product": {
"name": "automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"product_id": "automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-eda-controller@1.2.4-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"product": {
"name": "automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"product_id": "automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-eda-controller-base@1.2.4-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"product": {
"name": "automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"product_id": "automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-eda-controller-base-services@1.2.4-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"product": {
"name": "automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"product_id": "automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-eda-controller-event-stream-services@1.2.4-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"product": {
"name": "automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"product_id": "automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-eda-controller-worker-services@1.2.4-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base%2Bactivitystream@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base%2Bapi_documentation@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base%2Bauthentication@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base%2Bchannel_auth@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base%2Bfeature_flags@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base%2Bjwt_consumer@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base%2Boauth2_provider@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base%2Brbac@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base%2Bredis_client@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base%2Bresource_registry@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base%2Brest_filters@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"product": {
"name": "python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"product_id": "python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django-ansible-base@2.6.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"product": {
"name": "automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"product_id": "automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-platform-ui@2.6.5-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"product": {
"name": "python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"product_id": "python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-ng@4.11.5-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "receptorctl-0:1.6.3-2.el9ap.noarch",
"product": {
"name": "receptorctl-0:1.6.3-2.el9ap.noarch",
"product_id": "receptorctl-0:1.6.3-2.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptorctl@1.6.3-2.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"product": {
"name": "automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"product_id": "automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-cli@4.7.8-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-server-0:4.7.8-1.el9ap.noarch",
"product": {
"name": "automation-controller-server-0:4.7.8-1.el9ap.noarch",
"product_id": "automation-controller-server-0:4.7.8-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-server@4.7.8-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"product": {
"name": "automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"product_id": "automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-ui@4.7.8-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"product": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"product_id": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-botocore@1.34.162-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"product": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"product_id": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-requests@2.31.0-3.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"product": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"product_id": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@2.6.3-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.16.15-1.el9ap.noarch",
"product": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch",
"product_id": "ansible-core-1:2.16.15-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-1.el9ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "ansible-test-1:2.16.15-1.el9ap.noarch",
"product": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch",
"product_id": "ansible-test-1:2.16.15-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-test@2.16.15-1.el9ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"product": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"product_id": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-importer@0.4.37-2.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"product": {
"name": "ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"product_id": "ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools%2Bserver@26.1.0-2.el10ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"product": {
"name": "ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"product_id": "ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-2.el10ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-2.el10ap.noarch",
"product": {
"name": "ansible-lint-0:26.1.0-2.el10ap.noarch",
"product_id": "ansible-lint-0:26.1.0-2.el10ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-2.el10ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-2.el10ap.noarch",
"product": {
"name": "ansible-navigator-0:26.1.1-2.el10ap.noarch",
"product_id": "ansible-navigator-0:26.1.1-2.el10ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-2.el10ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-django-0:4.2.27-2.el10ap.noarch",
"product": {
"name": "python3-django-0:4.2.27-2.el10ap.noarch",
"product_id": "python3-django-0:4.2.27-2.el10ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-django@4.2.27-2.el10ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-core-2:2.16.15-2.el10ap.noarch",
"product": {
"name": "ansible-core-2:2.16.15-2.el10ap.noarch",
"product_id": "ansible-core-2:2.16.15-2.el10ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-2.el10ap?arch=noarch\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "receptorctl-0:1.6.3-2.el10ap.noarch",
"product": {
"name": "receptorctl-0:1.6.3-2.el10ap.noarch",
"product_id": "receptorctl-0:1.6.3-2.el10ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptorctl@1.6.3-2.el10ap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"product": {
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"product_id": "python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf@4.25.8-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"product": {
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"product_id": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf-debugsource@4.25.8-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"product": {
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"product_id": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf-debuginfo@4.25.8-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-2.el9ap.x86_64",
"product": {
"name": "receptor-0:1.6.3-2.el9ap.x86_64",
"product_id": "receptor-0:1.6.3-2.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-2.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"product": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"product_id": "receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-2.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"product_id": "receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-2.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.7.8-1.el9ap.x86_64",
"product": {
"name": "automation-controller-0:4.7.8-1.el9ap.x86_64",
"product_id": "automation-controller-0:4.7.8-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.7.8-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"product": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"product_id": "automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.7.8-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-2.el10ap.x86_64",
"product": {
"name": "receptor-0:1.6.3-2.el10ap.x86_64",
"product_id": "receptor-0:1.6.3-2.el10ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-2.el10ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"product": {
"name": "receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"product_id": "receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-2.el10ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"product_id": "receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-2.el10ap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"product": {
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"product_id": "python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf@4.25.8-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"product": {
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"product_id": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf-debugsource@4.25.8-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"product": {
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"product_id": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf-debuginfo@4.25.8-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-2.el9ap.ppc64le",
"product": {
"name": "receptor-0:1.6.3-2.el9ap.ppc64le",
"product_id": "receptor-0:1.6.3-2.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-2.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"product": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"product_id": "receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-2.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"product": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"product_id": "receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-2.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.7.8-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-0:4.7.8-1.el9ap.ppc64le",
"product_id": "automation-controller-0:4.7.8-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.7.8-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"product_id": "automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.7.8-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-2.el10ap.ppc64le",
"product": {
"name": "receptor-0:1.6.3-2.el10ap.ppc64le",
"product_id": "receptor-0:1.6.3-2.el10ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-2.el10ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"product": {
"name": "receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"product_id": "receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-2.el10ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"product": {
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"product_id": "receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-2.el10ap?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"product": {
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"product_id": "python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf@4.25.8-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"product": {
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"product_id": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf-debugsource@4.25.8-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"product": {
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"product_id": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf-debuginfo@4.25.8-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-2.el9ap.s390x",
"product": {
"name": "receptor-0:1.6.3-2.el9ap.s390x",
"product_id": "receptor-0:1.6.3-2.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-2.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"product": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"product_id": "receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-2.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"product": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"product_id": "receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-2.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.7.8-1.el9ap.s390x",
"product": {
"name": "automation-controller-0:4.7.8-1.el9ap.s390x",
"product_id": "automation-controller-0:4.7.8-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.7.8-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"product": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"product_id": "automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.7.8-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-2.el10ap.s390x",
"product": {
"name": "receptor-0:1.6.3-2.el10ap.s390x",
"product_id": "receptor-0:1.6.3-2.el10ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-2.el10ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"product": {
"name": "receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"product_id": "receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-2.el10ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"product": {
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"product_id": "receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-2.el10ap?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"product": {
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"product_id": "python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf@4.25.8-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"product": {
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"product_id": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf-debugsource@4.25.8-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"product": {
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"product_id": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-protobuf-debuginfo@4.25.8-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-2.el9ap.aarch64",
"product": {
"name": "receptor-0:1.6.3-2.el9ap.aarch64",
"product_id": "receptor-0:1.6.3-2.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-2.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"product": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"product_id": "receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-2.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"product_id": "receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-2.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.7.8-1.el9ap.aarch64",
"product": {
"name": "automation-controller-0:4.7.8-1.el9ap.aarch64",
"product_id": "automation-controller-0:4.7.8-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.7.8-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"product": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"product_id": "automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.7.8-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-2.el10ap.aarch64",
"product": {
"name": "receptor-0:1.6.3-2.el10ap.aarch64",
"product_id": "receptor-0:1.6.3-2.el10ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-2.el10ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"product": {
"name": "receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"product_id": "receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-2.el10ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"product_id": "receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-2.el10ap?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-2:2.16.15-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch"
},
"product_reference": "ansible-core-2:2.16.15-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-2:2.16.15-2.el10ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src"
},
"product_reference": "ansible-core-2:2.16.15-2.el10ap.src",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-2.el10ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-2.el10ap.src",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-2.el10ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-2.el10ap.src",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-2.el10ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-2.el10ap.src",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-django-0:4.2.27-2.el10ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src"
},
"product_reference": "python-django-0:4.2.27-2.el10ap.src",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-django-0:4.2.27-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch"
},
"product_reference": "python3-django-0:4.2.27-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-2:2.16.15-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch"
},
"product_reference": "ansible-core-2:2.16.15-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-2:2.16.15-2.el10ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src"
},
"product_reference": "ansible-core-2:2.16.15-2.el10ap.src",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-2.el10ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-2.el10ap.src",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-2.el10ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-2.el10ap.src",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-2.el10ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-2.el10ap.src",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-django-0:4.2.27-2.el10ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src"
},
"product_reference": "python-django-0:4.2.27-2.el10ap.src",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-django-0:4.2.27-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch"
},
"product_reference": "python3-django-0:4.2.27-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el10ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-2.el10ap.aarch64",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el10ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-2.el10ap.ppc64le",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el10ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x"
},
"product_reference": "receptor-0:1.6.3-2.el10ap.s390x",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el10ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src"
},
"product_reference": "receptor-0:1.6.3-2.el10ap.src",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el10ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-2.el10ap.x86_64",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el10ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el10ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el10ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el10ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el10ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-2.el10ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 10",
"product_id": "10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-2.el10ap.noarch",
"relates_to_product_reference": "10Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.7.8-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64"
},
"product_reference": "automation-controller-0:4.7.8-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.7.8-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-0:4.7.8-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.7.8-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x"
},
"product_reference": "automation-controller-0:4.7.8-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.7.8-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src"
},
"product_reference": "automation-controller-0:4.7.8-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.7.8-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64"
},
"product_reference": "automation-controller-0:4.7.8-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.7.8-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.7.8-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch"
},
"product_reference": "automation-controller-server-0:4.7.8-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.7.8-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch"
},
"product_reference": "python3.11-django-0:4.2.27-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src"
},
"product_reference": "python3.11-django-0:4.2.27-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Developer-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6-Inside-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-automation-platform-installer-0:2.6-4.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch"
},
"product_reference": "ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-automation-platform-installer-0:2.6-4.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src"
},
"product_reference": "ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.7.8-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64"
},
"product_reference": "automation-controller-0:4.7.8-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.7.8-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-0:4.7.8-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.7.8-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x"
},
"product_reference": "automation-controller-0:4.7.8-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.7.8-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src"
},
"product_reference": "automation-controller-0:4.7.8-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.7.8-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64"
},
"product_reference": "automation-controller-0:4.7.8-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.7.8-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.7.8-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch"
},
"product_reference": "automation-controller-server-0:4.7.8-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.7.8-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-eda-controller-0:1.2.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch"
},
"product_reference": "automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-eda-controller-0:1.2.4-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src"
},
"product_reference": "automation-eda-controller-0:1.2.4-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-eda-controller-base-0:1.2.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch"
},
"product_reference": "automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch"
},
"product_reference": "automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch"
},
"product_reference": "automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch"
},
"product_reference": "automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-0:2.6.20260121-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src"
},
"product_reference": "automation-gateway-0:2.6.20260121-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-config-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-server-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-hub-0:4.11.5-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch"
},
"product_reference": "automation-hub-0:4.11.5-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-hub-0:4.11.5-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src"
},
"product_reference": "automation-hub-0:4.11.5-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-platform-ui-0:2.6.5-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch"
},
"product_reference": "automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-platform-ui-0:2.6.5-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src"
},
"product_reference": "automation-platform-ui-0:2.6.5-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch"
},
"product_reference": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src"
},
"product_reference": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch"
},
"product_reference": "python3.11-django-0:4.2.27-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src"
},
"product_reference": "python3.11-django-0:4.2.27-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch"
},
"product_reference": "python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src"
},
"product_reference": "python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch"
},
"product_reference": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src"
},
"product_reference": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch"
},
"product_reference": "python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-ng-0:4.11.5-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src"
},
"product_reference": "python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64"
},
"product_reference": "python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le"
},
"product_reference": "python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x"
},
"product_reference": "python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src"
},
"product_reference": "python3.11-protobuf-0:4.25.8-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-0:4.25.8-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64"
},
"product_reference": "python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64"
},
"product_reference": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le"
},
"product_reference": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x"
},
"product_reference": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64"
},
"product_reference": "python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64"
},
"product_reference": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le"
},
"product_reference": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x"
},
"product_reference": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64"
},
"product_reference": "python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-pulpcore-0:3.49.49-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch"
},
"product_reference": "python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-pulpcore-0:3.49.49-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src"
},
"product_reference": "python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-2.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-2.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-2.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-2.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.6 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4565",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-06-16T15:00:59.960924+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373016"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the python protobuf package which can result in a denial of service. Applications that parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages, or a series of SGROUP\u00a0tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application that integrates the package with a RecursionError.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-protobuf: Unbounded recursion in Python Protobuf",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The availability impact of this denial-of-service vulnerability is confined to applications that directly integrate the Protobuf package. Within the context of a Red Hat system, the host machine itself is not expected to be impacted, thereby limiting the scope of disruption to individual application instances rather than broader system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64"
],
"known_not_affected": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4565"
},
{
"category": "external",
"summary": "RHBZ#2373016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4565",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4565"
},
{
"category": "external",
"summary": "https://github.com/protocolbuffers/protobuf/commit/17838beda2943d08b8a9d4df5b68f5f04f26d901",
"url": "https://github.com/protocolbuffers/protobuf/commit/17838beda2943d08b8a9d4df5b68f5f04f26d901"
}
],
"release_date": "2025-06-16T14:50:40.906000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T19:58:10+00:00",
"details": "For details on how to apply this update, refer to Ansible Automation Platform documentation.",
"product_ids": [
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1249"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-protobuf: Unbounded recursion in Python Protobuf"
},
{
"cve": "CVE-2025-53643",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2025-07-14T21:00:57.122280+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380000"
}
],
"notes": [
{
"category": "description",
"text": "A request smuggling flaw was found in the aiohttp python library. If a pure Python version of aiohttp is installed, without the usual C extensions, for example, or if AIOHTTP_NO_EXTENSIONS is enabled, an attacker can execute a request smuggling attack to bypass certain firewalls or proxy protections.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: AIOHTTP HTTP Request/Response Smuggling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64"
],
"known_not_affected": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53643"
},
{
"category": "external",
"summary": "RHBZ#2380000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380000"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53643",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53643"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a",
"url": "https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-9548-qrrj-x5pj",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-9548-qrrj-x5pj"
}
],
"release_date": "2025-07-14T20:17:18.247000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T19:58:10+00:00",
"details": "For details on how to apply this update, refer to Ansible Automation Platform documentation.",
"product_ids": [
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1249"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "aiohttp: AIOHTTP HTTP Request/Response Smuggling"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64"
],
"known_not_affected": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T19:58:10+00:00",
"details": "For details on how to apply this update, refer to Ansible Automation Platform documentation.",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1249"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-64460",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2025-12-02T16:01:05.300335+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418366"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Django. This vulnerability allows a remote attacker to cause a potential denial-of-service (DoS) attack triggering Central Processing Unit (CPU) and memory exhaustion via specially crafted Extensible Markup Language (XML) input processed by the XML Deserializer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Django: Django: Algorithmic complexity in XML Deserializer leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that process XML input using Django\u0027s XML Deserializer, including Red Hat Ansible Automation Platform, Red Hat OpenStack Platform, and OpenShift Service Mesh. A remote attacker can exploit this flaw by providing specially crafted XML, leading to a denial-of-service due to CPU and memory exhaustion.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src"
],
"known_not_affected": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64460"
},
{
"category": "external",
"summary": "RHBZ#2418366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64460"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460"
},
{
"category": "external",
"summary": "https://docs.djangoproject.com/en/dev/releases/security/",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"category": "external",
"summary": "https://groups.google.com/g/django-announce",
"url": "https://groups.google.com/g/django-announce"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/",
"url": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/"
}
],
"release_date": "2025-12-02T15:15:34.451000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T19:58:10+00:00",
"details": "For details on how to apply this update, refer to Ansible Automation Platform documentation.",
"product_ids": [
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1249"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Django: Django: Algorithmic complexity in XML Deserializer leads to denial of service"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src"
],
"known_not_affected": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T19:58:10+00:00",
"details": "For details on how to apply this update, refer to Ansible Automation Platform documentation.",
"product_ids": [
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1249"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-69223",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-06T20:01:19.831548+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427456"
}
],
"notes": [
{
"category": "description",
"text": "AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow a zip bomb to be used to execute a DoS against the AIOHTTP server. An attacker may be able to send a compressed request that when decompressed by AIOHTTP could exhaust the host\u0027s memory. This issue is fixed in version 3.13.3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: AIOHTTP\u0027s HTTP Parser auto_decompress feature is vulnerable to zip bomb",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64"
],
"known_not_affected": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69223"
},
{
"category": "external",
"summary": "RHBZ#2427456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69223"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/2b920c39002cee0ec5b402581779bbaaf7c9138a",
"url": "https://github.com/aio-libs/aiohttp/commit/2b920c39002cee0ec5b402581779bbaaf7c9138a"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6mq8-rvhq-8wgg",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6mq8-rvhq-8wgg"
}
],
"release_date": "2026-01-05T22:00:17.715000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-26T19:58:10+00:00",
"details": "For details on how to apply this update, refer to Ansible Automation Platform documentation.",
"product_ids": [
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1249"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-core-2:2.16.15-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python-django-0:4.2.27-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:python3-django-0:4.2.27-2.el10ap.noarch",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.src",
"10Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.aarch64",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.ppc64le",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.s390x",
"10Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el10ap.x86_64",
"10Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el10ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Developer-1.3:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6-Inside-1.4:receptorctl-0:1.6.3-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-automation-platform-installer-0:2.6-4.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools+server-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-dev-tools-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-lint-0:26.1.0-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:ansible-navigator-0:26.1.1-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-cli-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-server-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-ui-0:4.7.8-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:automation-controller-venv-tower-0:4.7.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-0:1.2.4-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-base-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-event-stream-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-eda-controller-worker-services-0:1.2.4-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-config-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-gateway-server-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-hub-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:automation-platform-ui-0:2.6.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-0:4.2.27-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+activitystream-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+api_documentation-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+authentication-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+channel_auth-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+feature_flags-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+jwt_consumer-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+oauth2_provider-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rbac-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+redis_client-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+resource_registry-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base+rest_filters-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-django-ansible-base-0:2.6.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-galaxy-ng-0:4.11.5-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debuginfo-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:python3.11-protobuf-debugsource-0:4.25.8-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-pulpcore-0:3.49.49-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.6:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.6:receptor-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debuginfo-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.6:receptor-debugsource-0:1.6.3-2.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.6:receptorctl-0:1.6.3-2.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "aiohttp: AIOHTTP\u0027s HTTP Parser auto_decompress feature is vulnerable to zip bomb"
}
]
}
RHSA-2026:1907
Vulnerability from csaf_redhat - Published: 2026-02-04 11:48 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for opentelemetry-collector is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Collector with the supported components for a Red Hat build of OpenTelemetry\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1907",
"url": "https://access.redhat.com/errata/RHSA-2026:1907"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1907.json"
}
],
"title": "Red Hat Security Advisory: opentelemetry-collector security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:08+00:00",
"generator": {
"date": "2026-02-11T08:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1907",
"initial_release_date": "2026-02-04T11:48:06+00:00",
"revision_history": [
{
"date": "2026-02-04T11:48:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-04T11:48:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.src",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.src",
"product_id": "opentelemetry-collector-0:0.135.0-3.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"product_id": "opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"product_id": "opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"product_id": "opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.x86_64",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.x86_64",
"product_id": "opentelemetry-collector-0:0.135.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.aarch64"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.s390x"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.src"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.x86_64"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.src",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T11:48:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.src",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1907"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.src",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1942
Vulnerability from csaf_redhat - Published: 2026-02-04 15:43 - Updated: 2026-02-11 12:59Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.15.3 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.15.3",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1942",
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47907",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52881",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58754",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-65945",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66506",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-24049",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1942.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.15.3",
"tracking": {
"current_release_date": "2026-02-11T12:59:31+00:00",
"generator": {
"date": "2026-02-11T12:59:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1942",
"initial_release_date": "2026-02-04T15:43:51+00:00",
"revision_history": [
{
"date": "2026-02-04T15:43:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-04T15:44:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T12:59:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.15",
"product": {
"name": "Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.15::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3A1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770135404"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134320"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3A547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770135436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134351"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Ab33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146612"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Ae657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Ac0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134397"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3A197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770149618"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Ae51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Aa8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146565"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134320"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134351"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Afb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134397"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146565"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134320"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Af57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134351"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134397"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146565"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-47907",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2025-08-07T16:01:06.247481+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2387083"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in database/sql. Concurrent queries can produce unexpected results when a query is cancelled during a Scan method call on returned Rows, creating a race condition. This vulnerability allows an attacker who can initiate and cancel queries to trigger this condition, possibly leading to inconsistent data being returned to the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "database/sql: Postgres Scan Race Condition",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Moderate severity issues rather than Important. The os/exec LookPath flaw requires a misconfigured PATH to be exploitable, and the database/sql race condition primarily impacts applications that cancel queries while running multiple queries concurrently. Both can cause unexpected behavior, but the exploitation scope is limited and unlikely to result in direct compromise in most typical deployments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "RHBZ#2387083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387083"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://go.dev/cl/693735",
"url": "https://go.dev/cl/693735"
},
{
"category": "external",
"summary": "https://go.dev/issue/74831",
"url": "https://go.dev/issue/74831"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM",
"url": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-3849",
"url": "https://pkg.go.dev/vuln/GO-2025-3849"
}
],
"release_date": "2025-08-07T15:25:30.704000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "database/sql: Postgres Scan Race Condition"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-52881",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:19:18.652000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404715"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "RHBZ#2404715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/selinux/pull/237",
"url": "https://github.com/opencontainers/selinux/pull/237"
}
],
"release_date": "2025-11-05T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using rootless containers, as doing so will block most of the inadvertent writes (runc would run with reduced privileges, making attempts to write to procfs files ineffective).\n* Based on our analysis, neither AppArmor or SELinux can protect against the full version of the redirected write attack. The container runtime is generally privileged enough to write to arbitrary procfs files, which is more than sufficient to cause a container breakout.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-58754",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-12T02:00:53.897605+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394735"
}
],
"notes": [
{
"category": "description",
"text": "Axios is a promise based HTTP client for the browser and Node.js. When Axios starting in version 0.28.0 and prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: \u0027stream\u0027`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios DoS via lack of data size check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Availability impact is limited to the application which bundles axios and not the host Red Hat system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "RHBZ#2394735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593",
"url": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/pull/7011",
"url": "https://github.com/axios/axios/pull/7011"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.12.0",
"url": "https://github.com/axios/axios/releases/tag/v1.12.0"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj",
"url": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj"
}
],
"release_date": "2025-09-12T01:16:40.513000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "axios: Axios DoS via lack of data size check"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.4, Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation. This issue has been patched in version 1.6.4.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-65945",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2025-12-04T19:01:14.733682+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418904"
}
],
"notes": [
{
"category": "description",
"text": "auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "RHBZ#2418904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e",
"url": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x",
"url": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x"
}
],
"release_date": "2025-12-04T18:45:37.517000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-66506",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2025-12-04T23:01:20.507333+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419056"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a free-to-use certificate authority. This vulnerability allows a denial of service (DoS) due to excessive memory allocation when processing a malicious OpenID Connect (OIDC) identity token containing numerous period characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as Fulcio, a certificate authority used for issuing code signing certificates, is susceptible to a denial of service when processing a specially crafted OpenID Connect (OIDC) token. This could lead to resource exhaustion and service unavailability in affected Red Hat products that utilize Fulcio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "RHBZ#2419056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a",
"url": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw"
}
],
"release_date": "2025-12-04T22:04:41.637000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-24049",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-01-22T05:00:54.709179+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431959"
}
],
"notes": [
{
"category": "description",
"text": "wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "RHBZ#2431959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef",
"url": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/releases/tag/0.46.2",
"url": "https://github.com/pypa/wheel/releases/tag/0.46.2"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx",
"url": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx"
}
],
"release_date": "2026-01-22T04:02:08.706000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking"
}
]
}
RHSA-2026:2144
Vulnerability from csaf_redhat - Published: 2026-02-05 15:45 - Updated: 2026-02-11 13:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The 1.3.2 release of Red Hat Trusted Artifact Signer OpenShift Operator.\nFor more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"title": "Topic"
},
{
"category": "general",
"text": "The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, and 4.20",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2144",
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64756",
"url": "https://access.redhat.com/security/cve/CVE-2025-64756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66506",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66564",
"url": "https://access.redhat.com/security/cve/CVE-2025-66564"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22772",
"url": "https://access.redhat.com/security/cve/CVE-2026-22772"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22774",
"url": "https://access.redhat.com/security/cve/CVE-2026-22774"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22775",
"url": "https://access.redhat.com/security/cve/CVE-2026-22775"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-23745",
"url": "https://access.redhat.com/security/cve/CVE-2026-23745"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-23950",
"url": "https://access.redhat.com/security/cve/CVE-2026-23950"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2144.json"
}
],
"title": "Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release",
"tracking": {
"current_release_date": "2026-02-11T13:01:42+00:00",
"generator": {
"date": "2026-02-11T13:01:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2144",
"initial_release_date": "2026-02-05T15:45:43+00:00",
"revision_history": [
{
"date": "2026-02-05T15:45:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T15:45:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T13:01:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Trusted Artifact Signer 1.3",
"product": {
"name": "Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:trusted_artifact_signer:1.3::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Trusted Artifact Signer"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"product_id": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rekor-backfill-redis-rhel9@sha256%3Aec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770106163"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"product": {
"name": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"product_id": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/certificate-transparency-rhel9@sha256%3A240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770107577"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"product": {
"name": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"product_id": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/trillian-database-rhel9@sha256%3Af4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770106156"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"product": {
"name": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"product_id": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fulcio-rhel9@sha256%3Ad876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770107446"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"product": {
"name": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"product_id": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/trillian-logserver-rhel9@sha256%3A7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770106156"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"product": {
"name": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"product_id": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"product_identification_helper": {
"purl": "pkg:oci/trillian-logsigner-rhel9@sha256%3A83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770106156"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64",
"product": {
"name": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64",
"product_id": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/trillian-redis-rhel9@sha256%3A7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770106156"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"product_id": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rekor-search-ui-rhel9@sha256%3A3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770107452"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"product_id": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rekor-server-rhel9@sha256%3A9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770106163"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"product": {
"name": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"product_id": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"product_identification_helper": {
"purl": "pkg:oci/timestamp-authority-rhel9@sha256%3A37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770107440"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64"
},
"product_reference": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64"
},
"product_reference": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64"
},
"product_reference": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64"
},
"product_reference": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64"
},
"product_reference": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64"
},
"product_reference": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
},
"product_reference": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-64756",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2025-11-17T18:01:28.077927+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2415451"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in glob. This vulnerability allows arbitrary command execution via processing files with malicious names when the glob command-line interface (CLI) is used with the -c/--cmd option, enabling shell metacharacters to trigger command injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glob: glob: Command Injection Vulnerability via Malicious Filenames",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw in glob allows arbitrary command execution when the `glob` command-line interface is used with the `-c/--cmd` option to process files with malicious names. The vulnerability is triggered by shell metacharacters in filenames, leading to command injection. The glob CLI tool utilizes the -c option to execute shell commands over the files which matched the searched pattern by using the shell:true parameter when creating the subprocess which will further execute the command informed via \u0027-c\u0027 option, this parameter allows the shell meta characters to be used and processed when executing the command. Given that information glob misses to sanitize the file name to eliminate such characters and expressions from the filename, leading to code execution as when performing the shell expansion such characters will be interpreted as shell commands.\n\nTo exploit this vulnerability the targeted system should run the glob CLI over a file with a maliciously crafted filename, additionally the attacker needs to have enough permission to create such file or trick the user to download and process the required file with the glob CLI.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64756"
},
{
"category": "external",
"summary": "RHBZ#2415451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2415451"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146",
"url": "https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2",
"url": "https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2"
}
],
"release_date": "2025-11-17T17:29:08.029000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using the `glob` command-line interface with the `-c` or `--cmd` option when processing filenames from untrusted sources. If programmatic use of `glob` is necessary, ensure that filenames are thoroughly sanitized before being passed to commands executed with shell interpretation enabled.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "glob: glob: Command Injection Vulnerability via Malicious Filenames"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-66506",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2025-12-04T23:01:20.507333+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419056"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a free-to-use certificate authority. This vulnerability allows a denial of service (DoS) due to excessive memory allocation when processing a malicious OpenID Connect (OIDC) identity token containing numerous period characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as Fulcio, a certificate authority used for issuing code signing certificates, is susceptible to a denial of service when processing a specially crafted OpenID Connect (OIDC) token. This could lead to resource exhaustion and service unavailability in affected Red Hat products that utilize Fulcio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "RHBZ#2419056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a",
"url": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw"
}
],
"release_date": "2025-12-04T22:04:41.637000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token"
},
{
"cve": "CVE-2025-66564",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2025-12-04T23:01:11.786030+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419054"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Sigstore Timestamp Authority. This vulnerability allows a denial of service via excessive memory allocation when processing a specially crafted Object Identifier or Content-Type header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/sigstore/timestamp-authority: Sigstore Timestamp Authority: Denial of Service via excessive OID or Content-Type header parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The Sigstore Timestamp Authority, a service for issuing RFC 3161 timestamps, is prone to excessive memory allocation. This occurs when processing untrusted OID payloads with many period characters or malformed Content-Type headers. An unauthenticated attacker could exploit this flaw to trigger a denial of service in affected Red Hat products that utilize this component.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66564"
},
{
"category": "external",
"summary": "RHBZ#2419054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419054"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66564"
},
{
"category": "external",
"summary": "https://github.com/sigstore/timestamp-authority/commit/0cae34e197d685a14904e0bad135b89d13b69421",
"url": "https://github.com/sigstore/timestamp-authority/commit/0cae34e197d685a14904e0bad135b89d13b69421"
},
{
"category": "external",
"summary": "https://github.com/sigstore/timestamp-authority/security/advisories/GHSA-4qg8-fj49-pxjh",
"url": "https://github.com/sigstore/timestamp-authority/security/advisories/GHSA-4qg8-fj49-pxjh"
}
],
"release_date": "2025-12-04T22:37:13.307000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/sigstore/timestamp-authority: Sigstore Timestamp Authority: Denial of Service via excessive OID or Content-Type header parsing"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-22772",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2026-01-12T22:01:21.336171+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428808"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a certificate authority for issuing code signing certificates. A remote attacker could exploit this by bypassing MetaIssuer URL validation due to unanchored regular expressions (regex) in the `metaRegex()` function. This vulnerability could lead to Server-Side Request Forgery (SSRF), allowing the attacker to probe internal network services. While the flaw only permits GET requests, preventing state changes or data exfiltration, it still poses a risk for internal network reconnaissance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fulcio: Fulcio: Server-Side Request Forgery (SSRF) via unanchored regex in MetaIssuer URL validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. A flaw in Fulcio\u0027s URL validation allows attackers to bypass security checks, leading to Server-Side Request Forgery (SSRF). This could enable internal network reconnaissance within affected Red Hat OpenShift and Ansible Automation Platform deployments, though it does not permit state changes or data exfiltration.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22772"
},
{
"category": "external",
"summary": "RHBZ#2428808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428808"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22772",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22772"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/eaae2f2be56df9dea5f9b439ec81bedae4c0978d",
"url": "https://github.com/sigstore/fulcio/commit/eaae2f2be56df9dea5f9b439ec81bedae4c0978d"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-59jp-pj84-45mr",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-59jp-pj84-45mr"
}
],
"release_date": "2026-01-12T20:58:53.659000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fulcio: Fulcio: Server-Side Request Forgery (SSRF) via unanchored regex in MetaIssuer URL validation"
},
{
"cve": "CVE-2026-22774",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2026-01-15T19:01:29.258462+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430095"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in devalue, a JavaScript library used for serializing values. A remote attacker can exploit this vulnerability by providing specially crafted input to the devalue.parse function. This can cause the application to consume excessive CPU time and memory, leading to a denial of service (DoS) condition. The root cause is an unchecked assumption during typed array hydration, where an ArrayBuffer is expected but not validated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "devalue: devalue: Denial of Service due to excessive resource consumption from untrusted input",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `devalue` JavaScript library, such as pgAdmin 4, Red Hat Build of Podman Desktop, and Red Hat Trusted Artifact Signer. A remote attacker can exploit this flaw by providing specially crafted input to the `devalue.parse` function, leading to excessive CPU and memory consumption and a denial of service condition.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22774"
},
{
"category": "external",
"summary": "RHBZ#2430095",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430095"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22774",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22774"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22774",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22774"
},
{
"category": "external",
"summary": "https://github.com/sveltejs/devalue/commit/11755849fa0634ae294a15ec0aef2f43efcad7c4",
"url": "https://github.com/sveltejs/devalue/commit/11755849fa0634ae294a15ec0aef2f43efcad7c4"
},
{
"category": "external",
"summary": "https://github.com/sveltejs/devalue/releases/tag/v5.6.2",
"url": "https://github.com/sveltejs/devalue/releases/tag/v5.6.2"
},
{
"category": "external",
"summary": "https://github.com/sveltejs/devalue/security/advisories/GHSA-vw5p-8cq8-m7mv",
"url": "https://github.com/sveltejs/devalue/security/advisories/GHSA-vw5p-8cq8-m7mv"
}
],
"release_date": "2026-01-15T18:53:21.963000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "devalue: devalue: Denial of Service due to excessive resource consumption from untrusted input"
},
{
"cve": "CVE-2026-22775",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2026-01-15T20:00:50.600496+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430109"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in devalue, a JavaScript library used for serializing values. A remote attacker could exploit this vulnerability by providing specially crafted input to the `devalue.parse` function. This improper input validation, specifically during the ArrayBuffer hydration process, can cause the application to consume excessive CPU time and memory. This ultimately leads to a denial of service (DoS), making the affected system unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "devalue: devalue: Denial of Service due to improper input validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat. The `devalue` JavaScript library, when used by applications to parse untrusted external input, is susceptible to a denial of service. Specially crafted input to the `devalue.parse` function can lead to excessive CPU and memory consumption, rendering the affected system unavailable. Red Hat products such as Red Hat Build of Podman Desktop and Red Hat Trusted Artifact Signer are affected if they process untrusted data using the vulnerable `devalue.parse` function.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22775"
},
{
"category": "external",
"summary": "RHBZ#2430109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22775",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22775"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22775",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22775"
},
{
"category": "external",
"summary": "https://github.com/sveltejs/devalue/commit/11755849fa0634ae294a15ec0aef2f43efcad7c4",
"url": "https://github.com/sveltejs/devalue/commit/11755849fa0634ae294a15ec0aef2f43efcad7c4"
},
{
"category": "external",
"summary": "https://github.com/sveltejs/devalue/releases/tag/v5.6.2",
"url": "https://github.com/sveltejs/devalue/releases/tag/v5.6.2"
},
{
"category": "external",
"summary": "https://github.com/sveltejs/devalue/security/advisories/GHSA-g2pg-6438-jwpf",
"url": "https://github.com/sveltejs/devalue/security/advisories/GHSA-g2pg-6438-jwpf"
}
],
"release_date": "2026-01-15T18:59:37.499000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "devalue: devalue: Denial of Service due to improper input validation"
},
{
"cve": "CVE-2026-23745",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-01-16T23:01:26.508727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the node-tar library. This vulnerability allows an attacker to craft malicious archives that, when extracted, can bypass intended security restrictions. This leads to arbitrary file overwrite and symlink poisoning, potentially allowing unauthorized modification of files on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-tar: tar: node-tar: Arbitrary file overwrite and symlink poisoning via unsanitized linkpaths in archives",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the node-tar library. The flaw allows an attacker to perform arbitrary file overwrite and symlink poisoning by crafting malicious tar archives. This occurs due to insufficient path sanitization of hardlink and symbolic link entries, even when the default secure behavior (preservePaths is false) is enabled.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-23745"
},
{
"category": "external",
"summary": "RHBZ#2430538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-23745",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23745"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e",
"url": "https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97",
"url": "https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97"
}
],
"release_date": "2026-01-16T22:00:08.769000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-tar: tar: node-tar: Arbitrary file overwrite and symlink poisoning via unsanitized linkpaths in archives"
},
{
"cve": "CVE-2026-23950",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-01-20T02:00:55.870044+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431036"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-tar, a library for Node.js. This race condition vulnerability occurs due to incomplete handling of Unicode path collisions within the `path-reservations` system on case-insensitive filesystems, such as macOS APFS. A remote attacker can exploit this by providing a specially crafted tar archive containing filenames that cause these collisions, bypassing internal concurrency safeguards. Successful exploitation can lead to arbitrary file overwrite.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-tar: tar: node-tar: Arbitrary file overwrite via Unicode path collision race condition",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The `node-tar` library is susceptible to a race condition due to incomplete handling of Unicode path collisions, which can lead to arbitrary file overwrites via symlink poisoning. However, this issue primarily affects case-insensitive or normalization-insensitive filesystems. Red Hat Enterprise Linux and other Red Hat products typically utilize case-sensitive filesystems, which may limit the direct impact of this flaw in default configurations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-23950"
},
{
"category": "external",
"summary": "RHBZ#2431036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431036"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-23950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23950"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6",
"url": "https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w",
"url": "https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w"
}
],
"release_date": "2026-01-20T00:40:48.510000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:45:43+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2144"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:240a9553315990a06a9d52eaf6e96e3aa1c743f1fbff33b95b489d41cef18f5a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:d876a5e41b8467cdde921032f2cd53e77bef99ebcd8b61d72a3ad411469ad352_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:ec50096d68a499e7f605bcfa7afd30845a03e0c4849736431f6752fa8b850897_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:3971738912069448174202486b61ed384153ca18af3e8430a55795a6e65eb58d_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:9746960bbc79e0ecf82a0ee12f878e90e202247dcaeb046bdd11db48a52ccb90_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:37b9359f11098a781158e5bc0850ec43b599d29a354b43745067656b0a234814_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:f4e92bf3f35d86fe895a2e3225098b3d4d9dae720ef1d45e9efcf23dec8242b6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:7c6cba78fb26addd9f056ec3f8b9376666db353451da37a4681a51d16f2ff76c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:83a8710df2032471c379f4cfbb3861ec9c4c7794f8b487483dbfb8cf57207750_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:7261ee18d6fd8d42614e94ae3bdb77c5acad54f2b9898365bf8668c60a32589a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-tar: tar: node-tar: Arbitrary file overwrite via Unicode path collision race condition"
}
]
}
RHSA-2026:2375
Vulnerability from csaf_redhat - Published: 2026-02-09 22:06 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Web Terminal Operator 1.15.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "The Web Terminal provides a way to access a fully in-browser terminal emulator within the OpenShift Console. Command-line tools for interacting with the OpenShift cluster are pre-installed.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2375",
"url": "https://access.redhat.com/errata/RHSA-2026:2375"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2375.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Web Terminal Operator 1.15.0 release.",
"tracking": {
"current_release_date": "2026-02-11T08:53:20+00:00",
"generator": {
"date": "2026-02-11T08:53:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2375",
"initial_release_date": "2026-02-09T22:06:53+00:00",
"revision_history": [
{
"date": "2026-02-09T22:06:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T22:07:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Web Terminal 1.15",
"product": {
"name": "Red Hat Web Terminal 1.15",
"product_id": "Red Hat Web Terminal 1.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:webterminal:1.15::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Web Terminal"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:bb8b42c5ad61f320a6b9acbcbc081df4572765fc6b9ce6bed7fa653c7f0d10a1_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:bb8b42c5ad61f320a6b9acbcbc081df4572765fc6b9ce6bed7fa653c7f0d10a1_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:bb8b42c5ad61f320a6b9acbcbc081df4572765fc6b9ce6bed7fa653c7f0d10a1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-exec-rhel9@sha256%3Abb8b42c5ad61f320a6b9acbcbc081df4572765fc6b9ce6bed7fa653c7f0d10a1?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770672881"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:32a943b80bc09d087d634aced86ed9865cdf8983fbb7aef6a1e46de9766b8f92_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:32a943b80bc09d087d634aced86ed9865cdf8983fbb7aef6a1e46de9766b8f92_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:32a943b80bc09d087d634aced86ed9865cdf8983fbb7aef6a1e46de9766b8f92_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-rhel9-operator@sha256%3A32a943b80bc09d087d634aced86ed9865cdf8983fbb7aef6a1e46de9766b8f92?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770672882"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:376684e2041f93229961a5d42caea9676974bae7b04c3359ca79b62b7843ff9d_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:376684e2041f93229961a5d42caea9676974bae7b04c3359ca79b62b7843ff9d_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:376684e2041f93229961a5d42caea9676974bae7b04c3359ca79b62b7843ff9d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-operator-bundle@sha256%3A376684e2041f93229961a5d42caea9676974bae7b04c3359ca79b62b7843ff9d?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770672845"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:1686ad755930e40920456e966384edc9b43d5ab62b9b09eb9acf541c5a5c79e3_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:1686ad755930e40920456e966384edc9b43d5ab62b9b09eb9acf541c5a5c79e3_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:1686ad755930e40920456e966384edc9b43d5ab62b9b09eb9acf541c5a5c79e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-tooling-rhel9@sha256%3A1686ad755930e40920456e966384edc9b43d5ab62b9b09eb9acf541c5a5c79e3?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770672905"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:bb8b42c5ad61f320a6b9acbcbc081df4572765fc6b9ce6bed7fa653c7f0d10a1_amd64 as a component of Red Hat Web Terminal 1.15",
"product_id": "Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:bb8b42c5ad61f320a6b9acbcbc081df4572765fc6b9ce6bed7fa653c7f0d10a1_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:bb8b42c5ad61f320a6b9acbcbc081df4572765fc6b9ce6bed7fa653c7f0d10a1_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:376684e2041f93229961a5d42caea9676974bae7b04c3359ca79b62b7843ff9d_amd64 as a component of Red Hat Web Terminal 1.15",
"product_id": "Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:376684e2041f93229961a5d42caea9676974bae7b04c3359ca79b62b7843ff9d_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:376684e2041f93229961a5d42caea9676974bae7b04c3359ca79b62b7843ff9d_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:32a943b80bc09d087d634aced86ed9865cdf8983fbb7aef6a1e46de9766b8f92_amd64 as a component of Red Hat Web Terminal 1.15",
"product_id": "Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:32a943b80bc09d087d634aced86ed9865cdf8983fbb7aef6a1e46de9766b8f92_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:32a943b80bc09d087d634aced86ed9865cdf8983fbb7aef6a1e46de9766b8f92_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:1686ad755930e40920456e966384edc9b43d5ab62b9b09eb9acf541c5a5c79e3_amd64 as a component of Red Hat Web Terminal 1.15",
"product_id": "Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:1686ad755930e40920456e966384edc9b43d5ab62b9b09eb9acf541c5a5c79e3_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:1686ad755930e40920456e966384edc9b43d5ab62b9b09eb9acf541c5a5c79e3_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:376684e2041f93229961a5d42caea9676974bae7b04c3359ca79b62b7843ff9d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:32a943b80bc09d087d634aced86ed9865cdf8983fbb7aef6a1e46de9766b8f92_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:1686ad755930e40920456e966384edc9b43d5ab62b9b09eb9acf541c5a5c79e3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:bb8b42c5ad61f320a6b9acbcbc081df4572765fc6b9ce6bed7fa653c7f0d10a1_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:376684e2041f93229961a5d42caea9676974bae7b04c3359ca79b62b7843ff9d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:32a943b80bc09d087d634aced86ed9865cdf8983fbb7aef6a1e46de9766b8f92_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:1686ad755930e40920456e966384edc9b43d5ab62b9b09eb9acf541c5a5c79e3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T22:06:53+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.20 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:bb8b42c5ad61f320a6b9acbcbc081df4572765fc6b9ce6bed7fa653c7f0d10a1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2375"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:bb8b42c5ad61f320a6b9acbcbc081df4572765fc6b9ce6bed7fa653c7f0d10a1_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:376684e2041f93229961a5d42caea9676974bae7b04c3359ca79b62b7843ff9d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:32a943b80bc09d087d634aced86ed9865cdf8983fbb7aef6a1e46de9766b8f92_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:1686ad755930e40920456e966384edc9b43d5ab62b9b09eb9acf541c5a5c79e3_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:0922
Vulnerability from csaf_redhat - Published: 2026-01-21 09:50 - Updated: 2026-02-11 08:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0922",
"url": "https://access.redhat.com/errata/RHSA-2026:0922"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0922.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-11T08:52:25+00:00",
"generator": {
"date": "2026-02-11T08:52:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:0922",
"initial_release_date": "2026-01-21T09:50:39+00:00",
"revision_history": [
{
"date": "2026-01-21T09:50:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-21T09:50:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:52:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el10_1.aarch64",
"product": {
"name": "go-toolset-0:1.25.5-1.el10_1.aarch64",
"product_id": "go-toolset-0:1.25.5-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el10_1.aarch64",
"product": {
"name": "golang-0:1.25.5-1.el10_1.aarch64",
"product_id": "golang-0:1.25.5-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el10_1.aarch64",
"product": {
"name": "golang-bin-0:1.25.5-1.el10_1.aarch64",
"product_id": "golang-bin-0:1.25.5-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el10_1.aarch64",
"product": {
"name": "golang-race-0:1.25.5-1.el10_1.aarch64",
"product_id": "golang-race-0:1.25.5-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el10_1.ppc64le",
"product": {
"name": "go-toolset-0:1.25.5-1.el10_1.ppc64le",
"product_id": "go-toolset-0:1.25.5-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el10_1.ppc64le",
"product": {
"name": "golang-0:1.25.5-1.el10_1.ppc64le",
"product_id": "golang-0:1.25.5-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el10_1.ppc64le",
"product": {
"name": "golang-bin-0:1.25.5-1.el10_1.ppc64le",
"product_id": "golang-bin-0:1.25.5-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el10_1.ppc64le",
"product": {
"name": "golang-race-0:1.25.5-1.el10_1.ppc64le",
"product_id": "golang-race-0:1.25.5-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el10_1.x86_64",
"product": {
"name": "go-toolset-0:1.25.5-1.el10_1.x86_64",
"product_id": "go-toolset-0:1.25.5-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el10_1.x86_64",
"product": {
"name": "golang-0:1.25.5-1.el10_1.x86_64",
"product_id": "golang-0:1.25.5-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el10_1.x86_64",
"product": {
"name": "golang-bin-0:1.25.5-1.el10_1.x86_64",
"product_id": "golang-bin-0:1.25.5-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el10_1.x86_64",
"product": {
"name": "golang-race-0:1.25.5-1.el10_1.x86_64",
"product_id": "golang-race-0:1.25.5-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-1.el10_1.s390x",
"product": {
"name": "go-toolset-0:1.25.5-1.el10_1.s390x",
"product_id": "go-toolset-0:1.25.5-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el10_1.s390x",
"product": {
"name": "golang-0:1.25.5-1.el10_1.s390x",
"product_id": "golang-0:1.25.5-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-1.el10_1.s390x",
"product": {
"name": "golang-bin-0:1.25.5-1.el10_1.s390x",
"product_id": "golang-bin-0:1.25.5-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-1.el10_1.s390x",
"product": {
"name": "golang-race-0:1.25.5-1.el10_1.s390x",
"product_id": "golang-race-0:1.25.5-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-1.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.5-1.el10_1.src",
"product": {
"name": "golang-0:1.25.5-1.el10_1.src",
"product_id": "golang-0:1.25.5-1.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-1.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.5-1.el10_1.noarch",
"product": {
"name": "golang-docs-0:1.25.5-1.el10_1.noarch",
"product_id": "golang-docs-0:1.25.5-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.5-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.5-1.el10_1.noarch",
"product": {
"name": "golang-misc-0:1.25.5-1.el10_1.noarch",
"product_id": "golang-misc-0:1.25.5-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.5-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.5-1.el10_1.noarch",
"product": {
"name": "golang-src-0:1.25.5-1.el10_1.noarch",
"product_id": "golang-src-0:1.25.5-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.5-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.5-1.el10_1.noarch",
"product": {
"name": "golang-tests-0:1.25.5-1.el10_1.noarch",
"product_id": "golang-tests-0:1.25.5-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.5-1.el10_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.aarch64"
},
"product_reference": "go-toolset-0:1.25.5-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.ppc64le"
},
"product_reference": "go-toolset-0:1.25.5-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.s390x"
},
"product_reference": "go-toolset-0:1.25.5-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.x86_64"
},
"product_reference": "go-toolset-0:1.25.5-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.aarch64"
},
"product_reference": "golang-0:1.25.5-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.ppc64le"
},
"product_reference": "golang-0:1.25.5-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.s390x"
},
"product_reference": "golang-0:1.25.5-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.src"
},
"product_reference": "golang-0:1.25.5-1.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.x86_64"
},
"product_reference": "golang-0:1.25.5-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.aarch64"
},
"product_reference": "golang-bin-0:1.25.5-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.ppc64le"
},
"product_reference": "golang-bin-0:1.25.5-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.s390x"
},
"product_reference": "golang-bin-0:1.25.5-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.x86_64"
},
"product_reference": "golang-bin-0:1.25.5-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.5-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-docs-0:1.25.5-1.el10_1.noarch"
},
"product_reference": "golang-docs-0:1.25.5-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.5-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-misc-0:1.25.5-1.el10_1.noarch"
},
"product_reference": "golang-misc-0:1.25.5-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.aarch64"
},
"product_reference": "golang-race-0:1.25.5-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.ppc64le"
},
"product_reference": "golang-race-0:1.25.5-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.s390x"
},
"product_reference": "golang-race-0:1.25.5-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.x86_64"
},
"product_reference": "golang-race-0:1.25.5-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.5-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-src-0:1.25.5-1.el10_1.noarch"
},
"product_reference": "golang-src-0:1.25.5-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.5-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-tests-0:1.25.5-1.el10_1.noarch"
},
"product_reference": "golang-tests-0:1.25.5-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.5-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.5-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.5-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.5-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T09:50:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.5-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.5-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.5-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.5-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0922"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.5-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.5-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.5-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.5-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.5-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2323
Vulnerability from csaf_redhat - Published: 2026-02-09 11:51 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for git-lfs is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2323",
"url": "https://access.redhat.com/errata/RHSA-2026:2323"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2323.json"
}
],
"title": "Red Hat Security Advisory: git-lfs security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:16+00:00",
"generator": {
"date": "2026-02-11T08:53:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2323",
"initial_release_date": "2026-02-09T11:51:28+00:00",
"revision_history": [
{
"date": "2026-02-09T11:51:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T11:51:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.4.1-7.el8_10.ppc64le",
"product": {
"name": "git-lfs-0:3.4.1-7.el8_10.ppc64le",
"product_id": "git-lfs-0:3.4.1-7.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.4.1-7.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.ppc64le",
"product": {
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.ppc64le",
"product_id": "git-lfs-debugsource-0:3.4.1-7.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.4.1-7.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.ppc64le",
"product": {
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.ppc64le",
"product_id": "git-lfs-debuginfo-0:3.4.1-7.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.4.1-7.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.4.1-7.el8_10.x86_64",
"product": {
"name": "git-lfs-0:3.4.1-7.el8_10.x86_64",
"product_id": "git-lfs-0:3.4.1-7.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.4.1-7.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.x86_64",
"product": {
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.x86_64",
"product_id": "git-lfs-debugsource-0:3.4.1-7.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.4.1-7.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.x86_64",
"product": {
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.x86_64",
"product_id": "git-lfs-debuginfo-0:3.4.1-7.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.4.1-7.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.4.1-7.el8_10.s390x",
"product": {
"name": "git-lfs-0:3.4.1-7.el8_10.s390x",
"product_id": "git-lfs-0:3.4.1-7.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.4.1-7.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.s390x",
"product": {
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.s390x",
"product_id": "git-lfs-debugsource-0:3.4.1-7.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.4.1-7.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.s390x",
"product": {
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.s390x",
"product_id": "git-lfs-debuginfo-0:3.4.1-7.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.4.1-7.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.4.1-7.el8_10.src",
"product": {
"name": "git-lfs-0:3.4.1-7.el8_10.src",
"product_id": "git-lfs-0:3.4.1-7.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.4.1-7.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.4.1-7.el8_10.aarch64",
"product": {
"name": "git-lfs-0:3.4.1-7.el8_10.aarch64",
"product_id": "git-lfs-0:3.4.1-7.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.4.1-7.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.aarch64",
"product": {
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.aarch64",
"product_id": "git-lfs-debugsource-0:3.4.1-7.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.4.1-7.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.aarch64",
"product": {
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.aarch64",
"product_id": "git-lfs-debuginfo-0:3.4.1-7.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.4.1-7.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.4.1-7.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.aarch64"
},
"product_reference": "git-lfs-0:3.4.1-7.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.4.1-7.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.ppc64le"
},
"product_reference": "git-lfs-0:3.4.1-7.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.4.1-7.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.s390x"
},
"product_reference": "git-lfs-0:3.4.1-7.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.4.1-7.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.src"
},
"product_reference": "git-lfs-0:3.4.1-7.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.4.1-7.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.x86_64"
},
"product_reference": "git-lfs-0:3.4.1-7.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.aarch64"
},
"product_reference": "git-lfs-debuginfo-0:3.4.1-7.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.ppc64le"
},
"product_reference": "git-lfs-debuginfo-0:3.4.1-7.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.s390x"
},
"product_reference": "git-lfs-debuginfo-0:3.4.1-7.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.4.1-7.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.x86_64"
},
"product_reference": "git-lfs-debuginfo-0:3.4.1-7.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.aarch64"
},
"product_reference": "git-lfs-debugsource-0:3.4.1-7.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.ppc64le"
},
"product_reference": "git-lfs-debugsource-0:3.4.1-7.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.s390x"
},
"product_reference": "git-lfs-debugsource-0:3.4.1-7.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.4.1-7.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.x86_64"
},
"product_reference": "git-lfs-debugsource-0:3.4.1-7.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T11:51:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2323"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-0:3.4.1-7.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debuginfo-0:3.4.1-7.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:git-lfs-debugsource-0:3.4.1-7.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2149
Vulnerability from csaf_redhat - Published: 2026-02-05 16:16 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Kiali 2.17.3 for Red Hat OpenShift Service Mesh 3.2\n\nThis update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kiali 2.17.3, for Red Hat OpenShift Service Mesh 3.2, provides observability for the service mesh by offering a visual representation of the mesh topology and metrics, helping users monitor, trace, and manage efficiently.\n\nSecurity Fix(es):\n\n* kiali-ossmc-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284)\n\n* kiali-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284)\n\n* kiali-rhel9: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)\n\n* kiali-ossmc-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)\n\n* kiali-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)\n\n* kiali-ossmc-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)\n\n* kiali-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2149",
"url": "https://access.redhat.com/errata/RHSA-2026:2149"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13465",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22029",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-13465",
"url": "https://access.redhat.com/security/cve/cve-2025-13465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-15284",
"url": "https://access.redhat.com/security/cve/cve-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61729",
"url": "https://access.redhat.com/security/cve/cve-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2026-22029",
"url": "https://access.redhat.com/security/cve/cve-2026-22029"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification",
"url": "https://access.redhat.com/security/updates/classification"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2149.json"
}
],
"title": "Red Hat Security Advisory: Kiali 2.17.3 for Red Hat OpenShift Service Mesh 3.2",
"tracking": {
"current_release_date": "2026-02-11T08:53:14+00:00",
"generator": {
"date": "2026-02-11T08:53:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2149",
"initial_release_date": "2026-02-05T16:16:04+00:00",
"revision_history": [
{
"date": "2026-02-05T16:16:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T16:16:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Service Mesh 3.2",
"product": {
"name": "Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:3.2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Aa97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138513"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-operator-bundle@sha256%3Af3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770146001"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9-operator@sha256%3A447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3Ac602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770142326"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Ad9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138513"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9-operator@sha256%3A46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3Afcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770142326"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Aef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138513"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9-operator@sha256%3Ad1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3A700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770142326"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Aced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138513"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9-operator@sha256%3A22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3Ad2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770142326"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13465",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2026-01-21T20:01:28.774829+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431740"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Lodash. A prototype pollution vulnerability in the _.unset and _.omit functions allows an attacker able to control property paths to delete methods from global prototypes. By removing essential functionalities, this can result in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: prototype pollution in _.unset and _.omit functions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable by applications using the _.unset and _.omit functions on an object and allowing user input to determine the path of the property to be removed. This issue only allows the deletion of properties but does not allow overwriting their behavior, limiting the impact to a denial of service. Due to this reason, this vulnerability has been rated with an important severity.\n\nIn Grafana, JavaScript code runs only in the browser, while the server side is all Golang. Therefore, the worst-case scenario is a loss of functionality in the client application inside the browser. To reflect this, the CVSS availability metric and the severity of the Grafana and the Grafana-PCP component have been updated to low and moderate, respectively.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "RHBZ#2431740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
"url": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg"
}
],
"release_date": "2026-01-21T19:05:28.846000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:16:04+00:00",
"details": "See Kiali 2.17.3 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.2/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2149"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement strict input validation before passing any property paths to the _.unset and _.omit functions to block attempts to access the prototype chain. Ensure that strings like __proto__, constructor and prototype are blocked, for example.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: prototype pollution in _.unset and _.omit functions"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:16:04+00:00",
"details": "See Kiali 2.17.3 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.2/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2149"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:16:04+00:00",
"details": "See Kiali 2.17.3 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.2/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2149"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2026-22029",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-01-10T04:01:03.694749+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428412"
}
],
"notes": [
{
"category": "description",
"text": "React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs causing unintended javascript execution on the client. This is only an issue if you are creating redirect paths from untrusted content or via an open redirect. There is no impact if Declarative Mode (\u003cBrowserRouter\u003e) is being used. This issue has been patched in @remix-run/router version 1.23.2 and react-router version 7.12.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "RHBZ#2428412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22029",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22029"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx",
"url": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx"
}
],
"release_date": "2026-01-10T02:42:32.736000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:16:04+00:00",
"details": "See Kiali 2.17.3 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.2/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2149"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects"
}
]
}
RHSA-2026:2124
Vulnerability from csaf_redhat - Published: 2026-02-05 14:55 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for osbuild-composer is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2124",
"url": "https://access.redhat.com/errata/RHSA-2026:2124"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2124.json"
}
],
"title": "Red Hat Security Advisory: osbuild-composer security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:10+00:00",
"generator": {
"date": "2026-02-11T08:53:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2124",
"initial_release_date": "2026-02-05T14:55:40+00:00",
"revision_history": [
{
"date": "2026-02-05T14:55:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T14:55:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-3.el8_10.src",
"product": {
"name": "osbuild-composer-0:101.4-3.el8_10.src",
"product_id": "osbuild-composer-0:101.4-3.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-3.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-3.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-3.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-3.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-core-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-3.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-3.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.src"
},
"product_reference": "osbuild-composer-0:101.4-3.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-core-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T14:55:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2124"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2123
Vulnerability from csaf_redhat - Published: 2026-02-05 14:26 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Builds 1.7.0",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Builds 1.7.0",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2123",
"url": "https://access.redhat.com/errata/RHSA-2026:2123"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2123.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.0",
"tracking": {
"current_release_date": "2026-02-11T08:53:10+00:00",
"generator": {
"date": "2026-02-11T08:53:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2123",
"initial_release_date": "2026-02-05T14:26:23+00:00",
"revision_history": [
{
"date": "2026-02-05T14:26:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T14:26:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Builds for Red Hat OpenShift 1.7.0",
"product": {
"name": "Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_builds:1.7::el9"
}
}
}
],
"category": "product_family",
"name": "Builds for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:c215fefbe944f32ee3dd07774ea8b1fb4329067b614591c118b1f6ec9caa56af_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:c215fefbe944f32ee3dd07774ea8b1fb4329067b614591c118b1f6ec9caa56af_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:c215fefbe944f32ee3dd07774ea8b1fb4329067b614591c118b1f6ec9caa56af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-operator-bundle@sha256%3Ac215fefbe944f32ee3dd07774ea8b1fb4329067b614591c118b1f6ec9caa56af?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1770294777"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:c215fefbe944f32ee3dd07774ea8b1fb4329067b614591c118b1f6ec9caa56af_amd64 as a component of Builds for Red Hat OpenShift 1.7.0",
"product_id": "Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:c215fefbe944f32ee3dd07774ea8b1fb4329067b614591c118b1f6ec9caa56af_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:c215fefbe944f32ee3dd07774ea8b1fb4329067b614591c118b1f6ec9caa56af_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.7.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:c215fefbe944f32ee3dd07774ea8b1fb4329067b614591c118b1f6ec9caa56af_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T14:26:23+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift 1.6.z upgrade to 1.7.0",
"product_ids": [
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:c215fefbe944f32ee3dd07774ea8b1fb4329067b614591c118b1f6ec9caa56af_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2123"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Builds for Red Hat OpenShift 1.7.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:c215fefbe944f32ee3dd07774ea8b1fb4329067b614591c118b1f6ec9caa56af_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2223
Vulnerability from csaf_redhat - Published: 2026-02-09 01:34 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2223",
"url": "https://access.redhat.com/errata/RHSA-2026:2223"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2223.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:16+00:00",
"generator": {
"date": "2026-02-11T08:53:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2223",
"initial_release_date": "2026-02-09T01:34:56+00:00",
"revision_history": [
{
"date": "2026-02-09T01:34:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T01:34:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src (go-toolset:rhel8)",
"product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=src\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=src\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.src (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-13.module%2Bel8.2.0%2B23958%2B12140f3a?arch=src\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.13.15-13.module%2Bel8.2.0%2B23958%2B12140f3a?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.13.15-13.module%2Bel8.2.0%2B23958%2B12140f3a?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.13.15-13.module%2Bel8.2.0%2B23958%2B12140f3a?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.13.15-13.module%2Bel8.2.0%2B23958%2B12140f3a?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.13.15-13.module%2Bel8.2.0%2B23958%2B12140f3a?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.13.15-13.module%2Bel8.2.0%2B23958%2B12140f3a?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.13.15-13.module%2Bel8.2.0%2B23958%2B12140f3a?arch=noarch\u0026rpmmod=go-toolset:rhel8:8020020260203092300:02f7cb7a"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:golang-bin-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:golang-docs-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:golang-misc-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:golang-race-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:golang-src-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:golang-tests-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-bin-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-docs-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-misc-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-race-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-src-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-tests-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T01:34:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-bin-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-docs-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-misc-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-race-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-src-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-tests-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2223"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.src::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-bin-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-docs-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-misc-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-race-0:1.13.15-13.module+el8.2.0+23958+12140f3a.x86_64::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-src-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8",
"AppStream-8.2.0.Z.AUS:golang-tests-0:1.13.15-13.module+el8.2.0+23958+12140f3a.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:0923
Vulnerability from csaf_redhat - Published: 2026-01-21 12:11 - Updated: 2026-02-11 08:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0923",
"url": "https://access.redhat.com/errata/RHSA-2026:0923"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0923.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-11T08:52:23+00:00",
"generator": {
"date": "2026-02-11T08:52:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:0923",
"initial_release_date": "2026-01-21T12:11:33+00:00",
"revision_history": [
{
"date": "2026-01-21T12:11:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-21T12:11:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:52:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-2.el9_7.aarch64",
"product": {
"name": "go-toolset-0:1.25.5-2.el9_7.aarch64",
"product_id": "go-toolset-0:1.25.5-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-2.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-2.el9_7.aarch64",
"product": {
"name": "golang-0:1.25.5-2.el9_7.aarch64",
"product_id": "golang-0:1.25.5-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-2.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-2.el9_7.aarch64",
"product": {
"name": "golang-bin-0:1.25.5-2.el9_7.aarch64",
"product_id": "golang-bin-0:1.25.5-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-2.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-2.el9_7.aarch64",
"product": {
"name": "golang-race-0:1.25.5-2.el9_7.aarch64",
"product_id": "golang-race-0:1.25.5-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-2.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-2.el9_7.ppc64le",
"product": {
"name": "go-toolset-0:1.25.5-2.el9_7.ppc64le",
"product_id": "go-toolset-0:1.25.5-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-2.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-2.el9_7.ppc64le",
"product": {
"name": "golang-0:1.25.5-2.el9_7.ppc64le",
"product_id": "golang-0:1.25.5-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-2.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-2.el9_7.ppc64le",
"product": {
"name": "golang-bin-0:1.25.5-2.el9_7.ppc64le",
"product_id": "golang-bin-0:1.25.5-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-2.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-2.el9_7.ppc64le",
"product": {
"name": "golang-race-0:1.25.5-2.el9_7.ppc64le",
"product_id": "golang-race-0:1.25.5-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-2.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-2.el9_7.x86_64",
"product": {
"name": "go-toolset-0:1.25.5-2.el9_7.x86_64",
"product_id": "go-toolset-0:1.25.5-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-2.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-2.el9_7.x86_64",
"product": {
"name": "golang-0:1.25.5-2.el9_7.x86_64",
"product_id": "golang-0:1.25.5-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-2.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-2.el9_7.x86_64",
"product": {
"name": "golang-bin-0:1.25.5-2.el9_7.x86_64",
"product_id": "golang-bin-0:1.25.5-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-2.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-2.el9_7.x86_64",
"product": {
"name": "golang-race-0:1.25.5-2.el9_7.x86_64",
"product_id": "golang-race-0:1.25.5-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-2.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.5-2.el9_7.s390x",
"product": {
"name": "go-toolset-0:1.25.5-2.el9_7.s390x",
"product_id": "go-toolset-0:1.25.5-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.5-2.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.5-2.el9_7.s390x",
"product": {
"name": "golang-0:1.25.5-2.el9_7.s390x",
"product_id": "golang-0:1.25.5-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-2.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.5-2.el9_7.s390x",
"product": {
"name": "golang-bin-0:1.25.5-2.el9_7.s390x",
"product_id": "golang-bin-0:1.25.5-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.5-2.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.5-2.el9_7.s390x",
"product": {
"name": "golang-race-0:1.25.5-2.el9_7.s390x",
"product_id": "golang-race-0:1.25.5-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.5-2.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.5-2.el9_7.src",
"product": {
"name": "golang-0:1.25.5-2.el9_7.src",
"product_id": "golang-0:1.25.5-2.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.5-2.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.5-2.el9_7.noarch",
"product": {
"name": "golang-docs-0:1.25.5-2.el9_7.noarch",
"product_id": "golang-docs-0:1.25.5-2.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.5-2.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.5-2.el9_7.noarch",
"product": {
"name": "golang-misc-0:1.25.5-2.el9_7.noarch",
"product_id": "golang-misc-0:1.25.5-2.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.5-2.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.5-2.el9_7.noarch",
"product": {
"name": "golang-src-0:1.25.5-2.el9_7.noarch",
"product_id": "golang-src-0:1.25.5-2.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.5-2.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.5-2.el9_7.noarch",
"product": {
"name": "golang-tests-0:1.25.5-2.el9_7.noarch",
"product_id": "golang-tests-0:1.25.5-2.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.5-2.el9_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.aarch64"
},
"product_reference": "go-toolset-0:1.25.5-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.ppc64le"
},
"product_reference": "go-toolset-0:1.25.5-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.s390x"
},
"product_reference": "go-toolset-0:1.25.5-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.5-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.x86_64"
},
"product_reference": "go-toolset-0:1.25.5-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.aarch64"
},
"product_reference": "golang-0:1.25.5-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.ppc64le"
},
"product_reference": "golang-0:1.25.5-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.s390x"
},
"product_reference": "golang-0:1.25.5-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-2.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.src"
},
"product_reference": "golang-0:1.25.5-2.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.5-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.x86_64"
},
"product_reference": "golang-0:1.25.5-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.aarch64"
},
"product_reference": "golang-bin-0:1.25.5-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.ppc64le"
},
"product_reference": "golang-bin-0:1.25.5-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.s390x"
},
"product_reference": "golang-bin-0:1.25.5-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.5-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.x86_64"
},
"product_reference": "golang-bin-0:1.25.5-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.5-2.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.5-2.el9_7.noarch"
},
"product_reference": "golang-docs-0:1.25.5-2.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.5-2.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.5-2.el9_7.noarch"
},
"product_reference": "golang-misc-0:1.25.5-2.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.aarch64"
},
"product_reference": "golang-race-0:1.25.5-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.ppc64le"
},
"product_reference": "golang-race-0:1.25.5-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.s390x"
},
"product_reference": "golang-race-0:1.25.5-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.5-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.x86_64"
},
"product_reference": "golang-race-0:1.25.5-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.5-2.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.5-2.el9_7.noarch"
},
"product_reference": "golang-src-0:1.25.5-2.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.5-2.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.5-2.el9_7.noarch"
},
"product_reference": "golang-tests-0:1.25.5-2.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.5-2.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.5-2.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.5-2.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.5-2.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T12:11:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.5-2.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.5-2.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.5-2.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.5-2.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0923"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.5-2.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.5-2.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.5-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.5-2.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.5-2.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1431
Vulnerability from csaf_redhat - Published: 2026-01-27 20:01 - Updated: 2026-02-11 08:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift distributed tracing platform (Tempo) 3.8.2 has been released",
"title": "Topic"
},
{
"category": "general",
"text": "This release of the Red Hat OpenShift distributed tracing platform (Tempo) provides new features, security improvements, and bug fixes.\n\n\nBreaking changes:\n\n* Nothing\n\n\nDeprecations:\n\n* Nothing\n\n\nTechnology Preview features:\n\n* Nothing\n\n\nEnhancements:\n\n* Nothing\n\n\nBug fixes:\n\n* https://access.redhat.com/security/cve/cve-2025-61729\n\n\nKnown issues:\n\n* Nothing",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1431",
"url": "https://access.redhat.com/errata/RHSA-2026:1431"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1431.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.8.2 release",
"tracking": {
"current_release_date": "2026-02-11T08:52:46+00:00",
"generator": {
"date": "2026-02-11T08:52:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1431",
"initial_release_date": "2026-01-27T20:01:40+00:00",
"revision_history": [
{
"date": "2026-01-27T20:01:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-27T20:01:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:52:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.8.1",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.8::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:5aa0efed8dcaa243a0ef634ff9bb1c5c1cd0604b9126ca8c5d2be783b0ce9ce4_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:5aa0efed8dcaa243a0ef634ff9bb1c5c1cd0604b9126ca8c5d2be783b0ce9ce4_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:5aa0efed8dcaa243a0ef634ff9bb1c5c1cd0604b9126ca8c5d2be783b0ce9ce4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256%3A5aa0efed8dcaa243a0ef634ff9bb1c5c1cd0604b9126ca8c5d2be783b0ce9ce4?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769216494"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e823918ca17586fdde683a2abc8a28e54a57da05ca6ad034eddc88e053b8910e_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e823918ca17586fdde683a2abc8a28e54a57da05ca6ad034eddc88e053b8910e_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e823918ca17586fdde683a2abc8a28e54a57da05ca6ad034eddc88e053b8910e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256%3Ae823918ca17586fdde683a2abc8a28e54a57da05ca6ad034eddc88e053b8910e?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205912"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:ad926ea5cd385491fdabdfc55bbef030db735223993476551188669137822420_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:ad926ea5cd385491fdabdfc55bbef030db735223993476551188669137822420_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:ad926ea5cd385491fdabdfc55bbef030db735223993476551188669137822420_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel8@sha256%3Aad926ea5cd385491fdabdfc55bbef030db735223993476551188669137822420?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205886"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:5776c381ef25df2a99a9c2e383aa309c8355be9158265c5dc971718b710a22ad_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:5776c381ef25df2a99a9c2e383aa309c8355be9158265c5dc971718b710a22ad_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:5776c381ef25df2a99a9c2e383aa309c8355be9158265c5dc971718b710a22ad_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256%3A5776c381ef25df2a99a9c2e383aa309c8355be9158265c5dc971718b710a22ad?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205882"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ff6b07a3c1c30283e9b594417d8d1ad7cca42845f3249487caa161283cf897e4_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ff6b07a3c1c30283e9b594417d8d1ad7cca42845f3249487caa161283cf897e4_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ff6b07a3c1c30283e9b594417d8d1ad7cca42845f3249487caa161283cf897e4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256%3Aff6b07a3c1c30283e9b594417d8d1ad7cca42845f3249487caa161283cf897e4?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769207949"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:bf3f771027326470a3c0aa1bbf2cfe566d02b663b6e71c83c0a6975617eeb857_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:bf3f771027326470a3c0aa1bbf2cfe566d02b663b6e71c83c0a6975617eeb857_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:bf3f771027326470a3c0aa1bbf2cfe566d02b663b6e71c83c0a6975617eeb857_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256%3Abf3f771027326470a3c0aa1bbf2cfe566d02b663b6e71c83c0a6975617eeb857?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205887"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:9c8fa2cd6223c1a3318c03cd3dcaae46c6b7faafc9929d1793804138aa7c5729_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:9c8fa2cd6223c1a3318c03cd3dcaae46c6b7faafc9929d1793804138aa7c5729_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:9c8fa2cd6223c1a3318c03cd3dcaae46c6b7faafc9929d1793804138aa7c5729_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256%3A9c8fa2cd6223c1a3318c03cd3dcaae46c6b7faafc9929d1793804138aa7c5729?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205877"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:4eef80a7de28809f11d5e57071b1876026cd52e126b1b5e1b4ee9e03dcc74926_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:4eef80a7de28809f11d5e57071b1876026cd52e126b1b5e1b4ee9e03dcc74926_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:4eef80a7de28809f11d5e57071b1876026cd52e126b1b5e1b4ee9e03dcc74926_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256%3A4eef80a7de28809f11d5e57071b1876026cd52e126b1b5e1b4ee9e03dcc74926?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205912"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:8a965138f8ee4e928e1e73dd03422c3aaff50fdcaf1fd4764b723b9deaa13207_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:8a965138f8ee4e928e1e73dd03422c3aaff50fdcaf1fd4764b723b9deaa13207_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:8a965138f8ee4e928e1e73dd03422c3aaff50fdcaf1fd4764b723b9deaa13207_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel8@sha256%3A8a965138f8ee4e928e1e73dd03422c3aaff50fdcaf1fd4764b723b9deaa13207?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205886"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:e6fe03967896706f830a9d2e2ef15f465179d0b0444d2db9d7e8f0cd1d0153a6_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:e6fe03967896706f830a9d2e2ef15f465179d0b0444d2db9d7e8f0cd1d0153a6_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:e6fe03967896706f830a9d2e2ef15f465179d0b0444d2db9d7e8f0cd1d0153a6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256%3Ae6fe03967896706f830a9d2e2ef15f465179d0b0444d2db9d7e8f0cd1d0153a6?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205882"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:d657463e0e97a96670471c00d81f2267d09affc25aaab1059695b9d2a1662509_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:d657463e0e97a96670471c00d81f2267d09affc25aaab1059695b9d2a1662509_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:d657463e0e97a96670471c00d81f2267d09affc25aaab1059695b9d2a1662509_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256%3Ad657463e0e97a96670471c00d81f2267d09affc25aaab1059695b9d2a1662509?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769207949"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:1717378abf8e326a0d676cdd6514e82e7071454f0b40eddaf63621d3019c84be_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:1717378abf8e326a0d676cdd6514e82e7071454f0b40eddaf63621d3019c84be_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:1717378abf8e326a0d676cdd6514e82e7071454f0b40eddaf63621d3019c84be_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256%3A1717378abf8e326a0d676cdd6514e82e7071454f0b40eddaf63621d3019c84be?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205887"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:08ea7630ecfcd51396d442204bc612b4cec3480ab1bb4a8333ecbc829b446da9_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:08ea7630ecfcd51396d442204bc612b4cec3480ab1bb4a8333ecbc829b446da9_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:08ea7630ecfcd51396d442204bc612b4cec3480ab1bb4a8333ecbc829b446da9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256%3A08ea7630ecfcd51396d442204bc612b4cec3480ab1bb4a8333ecbc829b446da9?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205877"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:f04cb87f9b59d5de9963bf5758987c7491cbe39055be9625bd64b402cafad7d6_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:f04cb87f9b59d5de9963bf5758987c7491cbe39055be9625bd64b402cafad7d6_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:f04cb87f9b59d5de9963bf5758987c7491cbe39055be9625bd64b402cafad7d6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256%3Af04cb87f9b59d5de9963bf5758987c7491cbe39055be9625bd64b402cafad7d6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205912"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:aa689016572b7bcfbee69891be7ff0321f04e9556eed4a1070f30f5d2c8ead32_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:aa689016572b7bcfbee69891be7ff0321f04e9556eed4a1070f30f5d2c8ead32_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:aa689016572b7bcfbee69891be7ff0321f04e9556eed4a1070f30f5d2c8ead32_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel8@sha256%3Aaa689016572b7bcfbee69891be7ff0321f04e9556eed4a1070f30f5d2c8ead32?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205886"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:dacfc16ea37c8d6767b6e6b5fbca08f93539b337e21b24503b65dfa6006ebfc9_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:dacfc16ea37c8d6767b6e6b5fbca08f93539b337e21b24503b65dfa6006ebfc9_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:dacfc16ea37c8d6767b6e6b5fbca08f93539b337e21b24503b65dfa6006ebfc9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256%3Adacfc16ea37c8d6767b6e6b5fbca08f93539b337e21b24503b65dfa6006ebfc9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205882"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:fc1346adb0576408c777479acf97c8695c08f8b23342f24833a773c507ed9fe1_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:fc1346adb0576408c777479acf97c8695c08f8b23342f24833a773c507ed9fe1_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:fc1346adb0576408c777479acf97c8695c08f8b23342f24833a773c507ed9fe1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256%3Afc1346adb0576408c777479acf97c8695c08f8b23342f24833a773c507ed9fe1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769207949"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:9d773d087f2faf043645c29c456d05d1487c09c6eac9f0de73c600197c86acba_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:9d773d087f2faf043645c29c456d05d1487c09c6eac9f0de73c600197c86acba_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:9d773d087f2faf043645c29c456d05d1487c09c6eac9f0de73c600197c86acba_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256%3A9d773d087f2faf043645c29c456d05d1487c09c6eac9f0de73c600197c86acba?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205887"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:a7a37b50a7ea67d078bc54d5130d5ef76ab9415f0d6af83078435067ea1bf93f_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:a7a37b50a7ea67d078bc54d5130d5ef76ab9415f0d6af83078435067ea1bf93f_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:a7a37b50a7ea67d078bc54d5130d5ef76ab9415f0d6af83078435067ea1bf93f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256%3Aa7a37b50a7ea67d078bc54d5130d5ef76ab9415f0d6af83078435067ea1bf93f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205877"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e166d9c3434c28acdf511ed571c12f0099ed214b38e0f9df6c6265127da1263f_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e166d9c3434c28acdf511ed571c12f0099ed214b38e0f9df6c6265127da1263f_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e166d9c3434c28acdf511ed571c12f0099ed214b38e0f9df6c6265127da1263f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256%3Ae166d9c3434c28acdf511ed571c12f0099ed214b38e0f9df6c6265127da1263f?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205912"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:87f267faec715241e0e2d653bdb35d8cfe7d89e30c674270b4c6e6865df9f98e_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:87f267faec715241e0e2d653bdb35d8cfe7d89e30c674270b4c6e6865df9f98e_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:87f267faec715241e0e2d653bdb35d8cfe7d89e30c674270b4c6e6865df9f98e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel8@sha256%3A87f267faec715241e0e2d653bdb35d8cfe7d89e30c674270b4c6e6865df9f98e?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205886"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:d48360ef345792faae0198abf1efd4bf237599d7c75e4d3e093cec525b48f42c_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:d48360ef345792faae0198abf1efd4bf237599d7c75e4d3e093cec525b48f42c_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:d48360ef345792faae0198abf1efd4bf237599d7c75e4d3e093cec525b48f42c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256%3Ad48360ef345792faae0198abf1efd4bf237599d7c75e4d3e093cec525b48f42c?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205882"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ccee5d6f296b322046c2245f65869edde24cea619690da410e9befedd0d3b897_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ccee5d6f296b322046c2245f65869edde24cea619690da410e9befedd0d3b897_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ccee5d6f296b322046c2245f65869edde24cea619690da410e9befedd0d3b897_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256%3Accee5d6f296b322046c2245f65869edde24cea619690da410e9befedd0d3b897?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769207949"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:947e54513d5ada2ffdd07c2a4c3ba95a17e14d15c5e19a1a8dd3be9c555b29b5_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:947e54513d5ada2ffdd07c2a4c3ba95a17e14d15c5e19a1a8dd3be9c555b29b5_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:947e54513d5ada2ffdd07c2a4c3ba95a17e14d15c5e19a1a8dd3be9c555b29b5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256%3A947e54513d5ada2ffdd07c2a4c3ba95a17e14d15c5e19a1a8dd3be9c555b29b5?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205887"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:55ffc4bbb576465df3b0cf17a8cdd582f6918e7f3eaa46439b44dd7f72221c91_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:55ffc4bbb576465df3b0cf17a8cdd582f6918e7f3eaa46439b44dd7f72221c91_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:55ffc4bbb576465df3b0cf17a8cdd582f6918e7f3eaa46439b44dd7f72221c91_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256%3A55ffc4bbb576465df3b0cf17a8cdd582f6918e7f3eaa46439b44dd7f72221c91?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769205877"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:5776c381ef25df2a99a9c2e383aa309c8355be9158265c5dc971718b710a22ad_amd64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:5776c381ef25df2a99a9c2e383aa309c8355be9158265c5dc971718b710a22ad_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:5776c381ef25df2a99a9c2e383aa309c8355be9158265c5dc971718b710a22ad_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:d48360ef345792faae0198abf1efd4bf237599d7c75e4d3e093cec525b48f42c_s390x as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:d48360ef345792faae0198abf1efd4bf237599d7c75e4d3e093cec525b48f42c_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:d48360ef345792faae0198abf1efd4bf237599d7c75e4d3e093cec525b48f42c_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:dacfc16ea37c8d6767b6e6b5fbca08f93539b337e21b24503b65dfa6006ebfc9_ppc64le as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:dacfc16ea37c8d6767b6e6b5fbca08f93539b337e21b24503b65dfa6006ebfc9_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:dacfc16ea37c8d6767b6e6b5fbca08f93539b337e21b24503b65dfa6006ebfc9_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:e6fe03967896706f830a9d2e2ef15f465179d0b0444d2db9d7e8f0cd1d0153a6_arm64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:e6fe03967896706f830a9d2e2ef15f465179d0b0444d2db9d7e8f0cd1d0153a6_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:e6fe03967896706f830a9d2e2ef15f465179d0b0444d2db9d7e8f0cd1d0153a6_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:4eef80a7de28809f11d5e57071b1876026cd52e126b1b5e1b4ee9e03dcc74926_arm64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:4eef80a7de28809f11d5e57071b1876026cd52e126b1b5e1b4ee9e03dcc74926_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:4eef80a7de28809f11d5e57071b1876026cd52e126b1b5e1b4ee9e03dcc74926_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e166d9c3434c28acdf511ed571c12f0099ed214b38e0f9df6c6265127da1263f_s390x as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e166d9c3434c28acdf511ed571c12f0099ed214b38e0f9df6c6265127da1263f_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e166d9c3434c28acdf511ed571c12f0099ed214b38e0f9df6c6265127da1263f_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e823918ca17586fdde683a2abc8a28e54a57da05ca6ad034eddc88e053b8910e_amd64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e823918ca17586fdde683a2abc8a28e54a57da05ca6ad034eddc88e053b8910e_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e823918ca17586fdde683a2abc8a28e54a57da05ca6ad034eddc88e053b8910e_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:f04cb87f9b59d5de9963bf5758987c7491cbe39055be9625bd64b402cafad7d6_ppc64le as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:f04cb87f9b59d5de9963bf5758987c7491cbe39055be9625bd64b402cafad7d6_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:f04cb87f9b59d5de9963bf5758987c7491cbe39055be9625bd64b402cafad7d6_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:87f267faec715241e0e2d653bdb35d8cfe7d89e30c674270b4c6e6865df9f98e_s390x as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:87f267faec715241e0e2d653bdb35d8cfe7d89e30c674270b4c6e6865df9f98e_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:87f267faec715241e0e2d653bdb35d8cfe7d89e30c674270b4c6e6865df9f98e_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:8a965138f8ee4e928e1e73dd03422c3aaff50fdcaf1fd4764b723b9deaa13207_arm64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:8a965138f8ee4e928e1e73dd03422c3aaff50fdcaf1fd4764b723b9deaa13207_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:8a965138f8ee4e928e1e73dd03422c3aaff50fdcaf1fd4764b723b9deaa13207_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:aa689016572b7bcfbee69891be7ff0321f04e9556eed4a1070f30f5d2c8ead32_ppc64le as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:aa689016572b7bcfbee69891be7ff0321f04e9556eed4a1070f30f5d2c8ead32_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:aa689016572b7bcfbee69891be7ff0321f04e9556eed4a1070f30f5d2c8ead32_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:ad926ea5cd385491fdabdfc55bbef030db735223993476551188669137822420_amd64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:ad926ea5cd385491fdabdfc55bbef030db735223993476551188669137822420_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:ad926ea5cd385491fdabdfc55bbef030db735223993476551188669137822420_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:5aa0efed8dcaa243a0ef634ff9bb1c5c1cd0604b9126ca8c5d2be783b0ce9ce4_amd64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:5aa0efed8dcaa243a0ef634ff9bb1c5c1cd0604b9126ca8c5d2be783b0ce9ce4_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:5aa0efed8dcaa243a0ef634ff9bb1c5c1cd0604b9126ca8c5d2be783b0ce9ce4_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:1717378abf8e326a0d676cdd6514e82e7071454f0b40eddaf63621d3019c84be_arm64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:1717378abf8e326a0d676cdd6514e82e7071454f0b40eddaf63621d3019c84be_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:1717378abf8e326a0d676cdd6514e82e7071454f0b40eddaf63621d3019c84be_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:947e54513d5ada2ffdd07c2a4c3ba95a17e14d15c5e19a1a8dd3be9c555b29b5_s390x as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:947e54513d5ada2ffdd07c2a4c3ba95a17e14d15c5e19a1a8dd3be9c555b29b5_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:947e54513d5ada2ffdd07c2a4c3ba95a17e14d15c5e19a1a8dd3be9c555b29b5_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:9d773d087f2faf043645c29c456d05d1487c09c6eac9f0de73c600197c86acba_ppc64le as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:9d773d087f2faf043645c29c456d05d1487c09c6eac9f0de73c600197c86acba_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:9d773d087f2faf043645c29c456d05d1487c09c6eac9f0de73c600197c86acba_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:bf3f771027326470a3c0aa1bbf2cfe566d02b663b6e71c83c0a6975617eeb857_amd64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:bf3f771027326470a3c0aa1bbf2cfe566d02b663b6e71c83c0a6975617eeb857_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:bf3f771027326470a3c0aa1bbf2cfe566d02b663b6e71c83c0a6975617eeb857_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ccee5d6f296b322046c2245f65869edde24cea619690da410e9befedd0d3b897_s390x as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ccee5d6f296b322046c2245f65869edde24cea619690da410e9befedd0d3b897_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ccee5d6f296b322046c2245f65869edde24cea619690da410e9befedd0d3b897_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:d657463e0e97a96670471c00d81f2267d09affc25aaab1059695b9d2a1662509_arm64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:d657463e0e97a96670471c00d81f2267d09affc25aaab1059695b9d2a1662509_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:d657463e0e97a96670471c00d81f2267d09affc25aaab1059695b9d2a1662509_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:fc1346adb0576408c777479acf97c8695c08f8b23342f24833a773c507ed9fe1_ppc64le as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:fc1346adb0576408c777479acf97c8695c08f8b23342f24833a773c507ed9fe1_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:fc1346adb0576408c777479acf97c8695c08f8b23342f24833a773c507ed9fe1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ff6b07a3c1c30283e9b594417d8d1ad7cca42845f3249487caa161283cf897e4_amd64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ff6b07a3c1c30283e9b594417d8d1ad7cca42845f3249487caa161283cf897e4_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ff6b07a3c1c30283e9b594417d8d1ad7cca42845f3249487caa161283cf897e4_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:08ea7630ecfcd51396d442204bc612b4cec3480ab1bb4a8333ecbc829b446da9_arm64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:08ea7630ecfcd51396d442204bc612b4cec3480ab1bb4a8333ecbc829b446da9_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:08ea7630ecfcd51396d442204bc612b4cec3480ab1bb4a8333ecbc829b446da9_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:55ffc4bbb576465df3b0cf17a8cdd582f6918e7f3eaa46439b44dd7f72221c91_s390x as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:55ffc4bbb576465df3b0cf17a8cdd582f6918e7f3eaa46439b44dd7f72221c91_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:55ffc4bbb576465df3b0cf17a8cdd582f6918e7f3eaa46439b44dd7f72221c91_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:9c8fa2cd6223c1a3318c03cd3dcaae46c6b7faafc9929d1793804138aa7c5729_amd64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:9c8fa2cd6223c1a3318c03cd3dcaae46c6b7faafc9929d1793804138aa7c5729_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:9c8fa2cd6223c1a3318c03cd3dcaae46c6b7faafc9929d1793804138aa7c5729_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:a7a37b50a7ea67d078bc54d5130d5ef76ab9415f0d6af83078435067ea1bf93f_ppc64le as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:a7a37b50a7ea67d078bc54d5130d5ef76ab9415f0d6af83078435067ea1bf93f_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel8@sha256:a7a37b50a7ea67d078bc54d5130d5ef76ab9415f0d6af83078435067ea1bf93f_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:5776c381ef25df2a99a9c2e383aa309c8355be9158265c5dc971718b710a22ad_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:d48360ef345792faae0198abf1efd4bf237599d7c75e4d3e093cec525b48f42c_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:dacfc16ea37c8d6767b6e6b5fbca08f93539b337e21b24503b65dfa6006ebfc9_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:e6fe03967896706f830a9d2e2ef15f465179d0b0444d2db9d7e8f0cd1d0153a6_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:4eef80a7de28809f11d5e57071b1876026cd52e126b1b5e1b4ee9e03dcc74926_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e166d9c3434c28acdf511ed571c12f0099ed214b38e0f9df6c6265127da1263f_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e823918ca17586fdde683a2abc8a28e54a57da05ca6ad034eddc88e053b8910e_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:f04cb87f9b59d5de9963bf5758987c7491cbe39055be9625bd64b402cafad7d6_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:87f267faec715241e0e2d653bdb35d8cfe7d89e30c674270b4c6e6865df9f98e_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:8a965138f8ee4e928e1e73dd03422c3aaff50fdcaf1fd4764b723b9deaa13207_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:aa689016572b7bcfbee69891be7ff0321f04e9556eed4a1070f30f5d2c8ead32_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:ad926ea5cd385491fdabdfc55bbef030db735223993476551188669137822420_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:5aa0efed8dcaa243a0ef634ff9bb1c5c1cd0604b9126ca8c5d2be783b0ce9ce4_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:1717378abf8e326a0d676cdd6514e82e7071454f0b40eddaf63621d3019c84be_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:947e54513d5ada2ffdd07c2a4c3ba95a17e14d15c5e19a1a8dd3be9c555b29b5_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:9d773d087f2faf043645c29c456d05d1487c09c6eac9f0de73c600197c86acba_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:bf3f771027326470a3c0aa1bbf2cfe566d02b663b6e71c83c0a6975617eeb857_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ccee5d6f296b322046c2245f65869edde24cea619690da410e9befedd0d3b897_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:d657463e0e97a96670471c00d81f2267d09affc25aaab1059695b9d2a1662509_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:fc1346adb0576408c777479acf97c8695c08f8b23342f24833a773c507ed9fe1_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ff6b07a3c1c30283e9b594417d8d1ad7cca42845f3249487caa161283cf897e4_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:08ea7630ecfcd51396d442204bc612b4cec3480ab1bb4a8333ecbc829b446da9_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:55ffc4bbb576465df3b0cf17a8cdd582f6918e7f3eaa46439b44dd7f72221c91_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:9c8fa2cd6223c1a3318c03cd3dcaae46c6b7faafc9929d1793804138aa7c5729_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:a7a37b50a7ea67d078bc54d5130d5ef76ab9415f0d6af83078435067ea1bf93f_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-27T20:01:40+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:5776c381ef25df2a99a9c2e383aa309c8355be9158265c5dc971718b710a22ad_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:d48360ef345792faae0198abf1efd4bf237599d7c75e4d3e093cec525b48f42c_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:dacfc16ea37c8d6767b6e6b5fbca08f93539b337e21b24503b65dfa6006ebfc9_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:e6fe03967896706f830a9d2e2ef15f465179d0b0444d2db9d7e8f0cd1d0153a6_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:4eef80a7de28809f11d5e57071b1876026cd52e126b1b5e1b4ee9e03dcc74926_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e166d9c3434c28acdf511ed571c12f0099ed214b38e0f9df6c6265127da1263f_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e823918ca17586fdde683a2abc8a28e54a57da05ca6ad034eddc88e053b8910e_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:f04cb87f9b59d5de9963bf5758987c7491cbe39055be9625bd64b402cafad7d6_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:87f267faec715241e0e2d653bdb35d8cfe7d89e30c674270b4c6e6865df9f98e_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:8a965138f8ee4e928e1e73dd03422c3aaff50fdcaf1fd4764b723b9deaa13207_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:aa689016572b7bcfbee69891be7ff0321f04e9556eed4a1070f30f5d2c8ead32_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:ad926ea5cd385491fdabdfc55bbef030db735223993476551188669137822420_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:5aa0efed8dcaa243a0ef634ff9bb1c5c1cd0604b9126ca8c5d2be783b0ce9ce4_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:1717378abf8e326a0d676cdd6514e82e7071454f0b40eddaf63621d3019c84be_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:947e54513d5ada2ffdd07c2a4c3ba95a17e14d15c5e19a1a8dd3be9c555b29b5_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:9d773d087f2faf043645c29c456d05d1487c09c6eac9f0de73c600197c86acba_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:bf3f771027326470a3c0aa1bbf2cfe566d02b663b6e71c83c0a6975617eeb857_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ccee5d6f296b322046c2245f65869edde24cea619690da410e9befedd0d3b897_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:d657463e0e97a96670471c00d81f2267d09affc25aaab1059695b9d2a1662509_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:fc1346adb0576408c777479acf97c8695c08f8b23342f24833a773c507ed9fe1_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ff6b07a3c1c30283e9b594417d8d1ad7cca42845f3249487caa161283cf897e4_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:08ea7630ecfcd51396d442204bc612b4cec3480ab1bb4a8333ecbc829b446da9_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:55ffc4bbb576465df3b0cf17a8cdd582f6918e7f3eaa46439b44dd7f72221c91_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:9c8fa2cd6223c1a3318c03cd3dcaae46c6b7faafc9929d1793804138aa7c5729_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:a7a37b50a7ea67d078bc54d5130d5ef76ab9415f0d6af83078435067ea1bf93f_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1431"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:5776c381ef25df2a99a9c2e383aa309c8355be9158265c5dc971718b710a22ad_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:d48360ef345792faae0198abf1efd4bf237599d7c75e4d3e093cec525b48f42c_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:dacfc16ea37c8d6767b6e6b5fbca08f93539b337e21b24503b65dfa6006ebfc9_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8@sha256:e6fe03967896706f830a9d2e2ef15f465179d0b0444d2db9d7e8f0cd1d0153a6_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:4eef80a7de28809f11d5e57071b1876026cd52e126b1b5e1b4ee9e03dcc74926_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e166d9c3434c28acdf511ed571c12f0099ed214b38e0f9df6c6265127da1263f_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:e823918ca17586fdde683a2abc8a28e54a57da05ca6ad034eddc88e053b8910e_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-gateway-rhel8@sha256:f04cb87f9b59d5de9963bf5758987c7491cbe39055be9625bd64b402cafad7d6_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:87f267faec715241e0e2d653bdb35d8cfe7d89e30c674270b4c6e6865df9f98e_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:8a965138f8ee4e928e1e73dd03422c3aaff50fdcaf1fd4764b723b9deaa13207_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:aa689016572b7bcfbee69891be7ff0321f04e9556eed4a1070f30f5d2c8ead32_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel8@sha256:ad926ea5cd385491fdabdfc55bbef030db735223993476551188669137822420_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:5aa0efed8dcaa243a0ef634ff9bb1c5c1cd0604b9126ca8c5d2be783b0ce9ce4_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:1717378abf8e326a0d676cdd6514e82e7071454f0b40eddaf63621d3019c84be_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:947e54513d5ada2ffdd07c2a4c3ba95a17e14d15c5e19a1a8dd3be9c555b29b5_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:9d773d087f2faf043645c29c456d05d1487c09c6eac9f0de73c600197c86acba_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-query-rhel8@sha256:bf3f771027326470a3c0aa1bbf2cfe566d02b663b6e71c83c0a6975617eeb857_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ccee5d6f296b322046c2245f65869edde24cea619690da410e9befedd0d3b897_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:d657463e0e97a96670471c00d81f2267d09affc25aaab1059695b9d2a1662509_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:fc1346adb0576408c777479acf97c8695c08f8b23342f24833a773c507ed9fe1_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8-operator@sha256:ff6b07a3c1c30283e9b594417d8d1ad7cca42845f3249487caa161283cf897e4_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:08ea7630ecfcd51396d442204bc612b4cec3480ab1bb4a8333ecbc829b446da9_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:55ffc4bbb576465df3b0cf17a8cdd582f6918e7f3eaa46439b44dd7f72221c91_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:9c8fa2cd6223c1a3318c03cd3dcaae46c6b7faafc9929d1793804138aa7c5729_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/tempo-rhel8@sha256:a7a37b50a7ea67d078bc54d5130d5ef76ab9415f0d6af83078435067ea1bf93f_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1416
Vulnerability from csaf_redhat - Published: 2026-01-27 16:53 - Updated: 2026-02-11 08:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat build of OpenTelemetry 3.8.2 has been released",
"title": "Topic"
},
{
"category": "general",
"text": "This release of the Red Hat build of OpenTelemetry provides new features, security improvements, and bug fixes.\n\nBreaking changes:\n\n* Nothing\n\n\nDeprecations:\n\n* Nothing\n\n\nTechnology Preview features:\n\n* Nothing\n\n\nEnhancements:\n\n* Nothing\n\n\nBug fixes:\n\n* https://access.redhat.com/security/cve/cve-2025-61729\n\n\nKnown issues:\n\n* Nothing",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1416",
"url": "https://access.redhat.com/errata/RHSA-2026:1416"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/red_hat_build_of_opentelemetry",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/red_hat_build_of_opentelemetry"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1416.json"
}
],
"title": "Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.8.2 release",
"tracking": {
"current_release_date": "2026-02-11T08:52:46+00:00",
"generator": {
"date": "2026-02-11T08:52:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1416",
"initial_release_date": "2026-01-27T16:53:57+00:00",
"revision_history": [
{
"date": "2026-01-27T16:53:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-27T16:54:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:52:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.8.1",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.8::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:4238e6a9c44e84d3dacec9b3fa31f2fe8817c11d454a77e3d494fe4e6067cb90_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:4238e6a9c44e84d3dacec9b3fa31f2fe8817c11d454a77e3d494fe4e6067cb90_amd64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:4238e6a9c44e84d3dacec9b3fa31f2fe8817c11d454a77e3d494fe4e6067cb90_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256%3A4238e6a9c44e84d3dacec9b3fa31f2fe8817c11d454a77e3d494fe4e6067cb90?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769173220"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:9245a9df4e3951733d478460e430d2eaa126e24c97b77862e0cc76f404df5273_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:9245a9df4e3951733d478460e430d2eaa126e24c97b77862e0cc76f404df5273_amd64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:9245a9df4e3951733d478460e430d2eaa126e24c97b77862e0cc76f404df5273_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256%3A9245a9df4e3951733d478460e430d2eaa126e24c97b77862e0cc76f404df5273?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e5608a35eca1b77b7c088990c168c4005220f9024204705bf8b74e4ac628ab95_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e5608a35eca1b77b7c088990c168c4005220f9024204705bf8b74e4ac628ab95_amd64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e5608a35eca1b77b7c088990c168c4005220f9024204705bf8b74e4ac628ab95_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256%3Ae5608a35eca1b77b7c088990c168c4005220f9024204705bf8b74e4ac628ab95?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171471"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e293d84e95380194a7d7b2a24e8f46ff38a7a3e6898525d322d9f5fc86dd62d8_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e293d84e95380194a7d7b2a24e8f46ff38a7a3e6898525d322d9f5fc86dd62d8_amd64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e293d84e95380194a7d7b2a24e8f46ff38a7a3e6898525d322d9f5fc86dd62d8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256%3Ae293d84e95380194a7d7b2a24e8f46ff38a7a3e6898525d322d9f5fc86dd62d8?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171495"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:40de93b086f52f44537ce3171480806abfde3e6784ac1f4730efcfb1ead14a26_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:40de93b086f52f44537ce3171480806abfde3e6784ac1f4730efcfb1ead14a26_arm64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:40de93b086f52f44537ce3171480806abfde3e6784ac1f4730efcfb1ead14a26_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256%3A40de93b086f52f44537ce3171480806abfde3e6784ac1f4730efcfb1ead14a26?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:9965e38d6bca3df52049fb90714d13a9e8b3f04b53882aebdc645854dbfc6fd5_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:9965e38d6bca3df52049fb90714d13a9e8b3f04b53882aebdc645854dbfc6fd5_arm64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:9965e38d6bca3df52049fb90714d13a9e8b3f04b53882aebdc645854dbfc6fd5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256%3A9965e38d6bca3df52049fb90714d13a9e8b3f04b53882aebdc645854dbfc6fd5?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171471"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:80d5f2b0f20f61437faaf2129cd5b24094cc49ffab5e07604a3d7dc8951a84bd_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:80d5f2b0f20f61437faaf2129cd5b24094cc49ffab5e07604a3d7dc8951a84bd_arm64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:80d5f2b0f20f61437faaf2129cd5b24094cc49ffab5e07604a3d7dc8951a84bd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256%3A80d5f2b0f20f61437faaf2129cd5b24094cc49ffab5e07604a3d7dc8951a84bd?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171495"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:2937cb735d6af6ef2ba64e0cfd4d8b0c6a808f9296bc12a70d276c760be5e5e8_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:2937cb735d6af6ef2ba64e0cfd4d8b0c6a808f9296bc12a70d276c760be5e5e8_ppc64le",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:2937cb735d6af6ef2ba64e0cfd4d8b0c6a808f9296bc12a70d276c760be5e5e8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256%3A2937cb735d6af6ef2ba64e0cfd4d8b0c6a808f9296bc12a70d276c760be5e5e8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e24ff0495b4aff5d681c0f2cea539f631efa569025bb9d3186dbf024d969e36f_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e24ff0495b4aff5d681c0f2cea539f631efa569025bb9d3186dbf024d969e36f_ppc64le",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e24ff0495b4aff5d681c0f2cea539f631efa569025bb9d3186dbf024d969e36f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256%3Ae24ff0495b4aff5d681c0f2cea539f631efa569025bb9d3186dbf024d969e36f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171471"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0102b2a2be8eeb26311e8d86d1b6613c7eda5a91f47e63e47ca90c5b2e412e45_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0102b2a2be8eeb26311e8d86d1b6613c7eda5a91f47e63e47ca90c5b2e412e45_ppc64le",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0102b2a2be8eeb26311e8d86d1b6613c7eda5a91f47e63e47ca90c5b2e412e45_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256%3A0102b2a2be8eeb26311e8d86d1b6613c7eda5a91f47e63e47ca90c5b2e412e45?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171495"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:36ec49cbed4262df1d9bd18cf2339c9e9666ef3aeba2482abcd92cf0f059ff27_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:36ec49cbed4262df1d9bd18cf2339c9e9666ef3aeba2482abcd92cf0f059ff27_s390x",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:36ec49cbed4262df1d9bd18cf2339c9e9666ef3aeba2482abcd92cf0f059ff27_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256%3A36ec49cbed4262df1d9bd18cf2339c9e9666ef3aeba2482abcd92cf0f059ff27?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:da0c28858f307197b80c4df0c08d6440a0f3f648fea8e64f35d28ff3b0a111db_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:da0c28858f307197b80c4df0c08d6440a0f3f648fea8e64f35d28ff3b0a111db_s390x",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:da0c28858f307197b80c4df0c08d6440a0f3f648fea8e64f35d28ff3b0a111db_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256%3Ada0c28858f307197b80c4df0c08d6440a0f3f648fea8e64f35d28ff3b0a111db?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171471"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:8fe51c4e9945e2dc5d5997863715d2ab76d7c65f4b5060cfbec52e609b692843_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:8fe51c4e9945e2dc5d5997863715d2ab76d7c65f4b5060cfbec52e609b692843_s390x",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:8fe51c4e9945e2dc5d5997863715d2ab76d7c65f4b5060cfbec52e609b692843_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256%3A8fe51c4e9945e2dc5d5997863715d2ab76d7c65f4b5060cfbec52e609b692843?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1769171495"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:2937cb735d6af6ef2ba64e0cfd4d8b0c6a808f9296bc12a70d276c760be5e5e8_ppc64le as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:2937cb735d6af6ef2ba64e0cfd4d8b0c6a808f9296bc12a70d276c760be5e5e8_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:2937cb735d6af6ef2ba64e0cfd4d8b0c6a808f9296bc12a70d276c760be5e5e8_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:36ec49cbed4262df1d9bd18cf2339c9e9666ef3aeba2482abcd92cf0f059ff27_s390x as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:36ec49cbed4262df1d9bd18cf2339c9e9666ef3aeba2482abcd92cf0f059ff27_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:36ec49cbed4262df1d9bd18cf2339c9e9666ef3aeba2482abcd92cf0f059ff27_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:40de93b086f52f44537ce3171480806abfde3e6784ac1f4730efcfb1ead14a26_arm64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:40de93b086f52f44537ce3171480806abfde3e6784ac1f4730efcfb1ead14a26_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:40de93b086f52f44537ce3171480806abfde3e6784ac1f4730efcfb1ead14a26_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:9245a9df4e3951733d478460e430d2eaa126e24c97b77862e0cc76f404df5273_amd64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:9245a9df4e3951733d478460e430d2eaa126e24c97b77862e0cc76f404df5273_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:9245a9df4e3951733d478460e430d2eaa126e24c97b77862e0cc76f404df5273_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:4238e6a9c44e84d3dacec9b3fa31f2fe8817c11d454a77e3d494fe4e6067cb90_amd64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:4238e6a9c44e84d3dacec9b3fa31f2fe8817c11d454a77e3d494fe4e6067cb90_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:4238e6a9c44e84d3dacec9b3fa31f2fe8817c11d454a77e3d494fe4e6067cb90_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:9965e38d6bca3df52049fb90714d13a9e8b3f04b53882aebdc645854dbfc6fd5_arm64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:9965e38d6bca3df52049fb90714d13a9e8b3f04b53882aebdc645854dbfc6fd5_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:9965e38d6bca3df52049fb90714d13a9e8b3f04b53882aebdc645854dbfc6fd5_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:da0c28858f307197b80c4df0c08d6440a0f3f648fea8e64f35d28ff3b0a111db_s390x as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:da0c28858f307197b80c4df0c08d6440a0f3f648fea8e64f35d28ff3b0a111db_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:da0c28858f307197b80c4df0c08d6440a0f3f648fea8e64f35d28ff3b0a111db_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e24ff0495b4aff5d681c0f2cea539f631efa569025bb9d3186dbf024d969e36f_ppc64le as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e24ff0495b4aff5d681c0f2cea539f631efa569025bb9d3186dbf024d969e36f_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e24ff0495b4aff5d681c0f2cea539f631efa569025bb9d3186dbf024d969e36f_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e5608a35eca1b77b7c088990c168c4005220f9024204705bf8b74e4ac628ab95_amd64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e5608a35eca1b77b7c088990c168c4005220f9024204705bf8b74e4ac628ab95_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e5608a35eca1b77b7c088990c168c4005220f9024204705bf8b74e4ac628ab95_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0102b2a2be8eeb26311e8d86d1b6613c7eda5a91f47e63e47ca90c5b2e412e45_ppc64le as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0102b2a2be8eeb26311e8d86d1b6613c7eda5a91f47e63e47ca90c5b2e412e45_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0102b2a2be8eeb26311e8d86d1b6613c7eda5a91f47e63e47ca90c5b2e412e45_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:80d5f2b0f20f61437faaf2129cd5b24094cc49ffab5e07604a3d7dc8951a84bd_arm64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:80d5f2b0f20f61437faaf2129cd5b24094cc49ffab5e07604a3d7dc8951a84bd_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:80d5f2b0f20f61437faaf2129cd5b24094cc49ffab5e07604a3d7dc8951a84bd_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:8fe51c4e9945e2dc5d5997863715d2ab76d7c65f4b5060cfbec52e609b692843_s390x as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:8fe51c4e9945e2dc5d5997863715d2ab76d7c65f4b5060cfbec52e609b692843_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:8fe51c4e9945e2dc5d5997863715d2ab76d7c65f4b5060cfbec52e609b692843_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e293d84e95380194a7d7b2a24e8f46ff38a7a3e6898525d322d9f5fc86dd62d8_amd64 as a component of Red Hat OpenShift distributed tracing 3.8.1",
"product_id": "Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e293d84e95380194a7d7b2a24e8f46ff38a7a3e6898525d322d9f5fc86dd62d8_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e293d84e95380194a7d7b2a24e8f46ff38a7a3e6898525d322d9f5fc86dd62d8_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.8.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:4238e6a9c44e84d3dacec9b3fa31f2fe8817c11d454a77e3d494fe4e6067cb90_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:2937cb735d6af6ef2ba64e0cfd4d8b0c6a808f9296bc12a70d276c760be5e5e8_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:36ec49cbed4262df1d9bd18cf2339c9e9666ef3aeba2482abcd92cf0f059ff27_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:40de93b086f52f44537ce3171480806abfde3e6784ac1f4730efcfb1ead14a26_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:9245a9df4e3951733d478460e430d2eaa126e24c97b77862e0cc76f404df5273_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:9965e38d6bca3df52049fb90714d13a9e8b3f04b53882aebdc645854dbfc6fd5_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:da0c28858f307197b80c4df0c08d6440a0f3f648fea8e64f35d28ff3b0a111db_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e24ff0495b4aff5d681c0f2cea539f631efa569025bb9d3186dbf024d969e36f_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e5608a35eca1b77b7c088990c168c4005220f9024204705bf8b74e4ac628ab95_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0102b2a2be8eeb26311e8d86d1b6613c7eda5a91f47e63e47ca90c5b2e412e45_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:80d5f2b0f20f61437faaf2129cd5b24094cc49ffab5e07604a3d7dc8951a84bd_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:8fe51c4e9945e2dc5d5997863715d2ab76d7c65f4b5060cfbec52e609b692843_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e293d84e95380194a7d7b2a24e8f46ff38a7a3e6898525d322d9f5fc86dd62d8_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:4238e6a9c44e84d3dacec9b3fa31f2fe8817c11d454a77e3d494fe4e6067cb90_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-27T16:53:57+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:2937cb735d6af6ef2ba64e0cfd4d8b0c6a808f9296bc12a70d276c760be5e5e8_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:36ec49cbed4262df1d9bd18cf2339c9e9666ef3aeba2482abcd92cf0f059ff27_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:40de93b086f52f44537ce3171480806abfde3e6784ac1f4730efcfb1ead14a26_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:9245a9df4e3951733d478460e430d2eaa126e24c97b77862e0cc76f404df5273_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:9965e38d6bca3df52049fb90714d13a9e8b3f04b53882aebdc645854dbfc6fd5_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:da0c28858f307197b80c4df0c08d6440a0f3f648fea8e64f35d28ff3b0a111db_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e24ff0495b4aff5d681c0f2cea539f631efa569025bb9d3186dbf024d969e36f_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e5608a35eca1b77b7c088990c168c4005220f9024204705bf8b74e4ac628ab95_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0102b2a2be8eeb26311e8d86d1b6613c7eda5a91f47e63e47ca90c5b2e412e45_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:80d5f2b0f20f61437faaf2129cd5b24094cc49ffab5e07604a3d7dc8951a84bd_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:8fe51c4e9945e2dc5d5997863715d2ab76d7c65f4b5060cfbec52e609b692843_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e293d84e95380194a7d7b2a24e8f46ff38a7a3e6898525d322d9f5fc86dd62d8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1416"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:2937cb735d6af6ef2ba64e0cfd4d8b0c6a808f9296bc12a70d276c760be5e5e8_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:36ec49cbed4262df1d9bd18cf2339c9e9666ef3aeba2482abcd92cf0f059ff27_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:40de93b086f52f44537ce3171480806abfde3e6784ac1f4730efcfb1ead14a26_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:9245a9df4e3951733d478460e430d2eaa126e24c97b77862e0cc76f404df5273_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:4238e6a9c44e84d3dacec9b3fa31f2fe8817c11d454a77e3d494fe4e6067cb90_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:9965e38d6bca3df52049fb90714d13a9e8b3f04b53882aebdc645854dbfc6fd5_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:da0c28858f307197b80c4df0c08d6440a0f3f648fea8e64f35d28ff3b0a111db_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e24ff0495b4aff5d681c0f2cea539f631efa569025bb9d3186dbf024d969e36f_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e5608a35eca1b77b7c088990c168c4005220f9024204705bf8b74e4ac628ab95_amd64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0102b2a2be8eeb26311e8d86d1b6613c7eda5a91f47e63e47ca90c5b2e412e45_ppc64le",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:80d5f2b0f20f61437faaf2129cd5b24094cc49ffab5e07604a3d7dc8951a84bd_arm64",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:8fe51c4e9945e2dc5d5997863715d2ab76d7c65f4b5060cfbec52e609b692843_s390x",
"Red Hat OpenShift distributed tracing 3.8.1:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e293d84e95380194a7d7b2a24e8f46ff38a7a3e6898525d322d9f5fc86dd62d8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2217
Vulnerability from csaf_redhat - Published: 2026-02-09 01:27 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2217",
"url": "https://access.redhat.com/errata/RHSA-2026:2217"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2217.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:15+00:00",
"generator": {
"date": "2026-02-11T08:53:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2217",
"initial_release_date": "2026-02-09T01:27:56+00:00",
"revision_history": [
{
"date": "2026-02-09T01:27:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T01:27:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src (go-toolset:rhel8)",
"product_id": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=src\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-3.module%2Bel8.4.0%2B22765%2B91da4d3f?arch=src\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src (go-toolset:rhel8)",
"product_id": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-18.module%2Bel8.4.0%2B23967%2B1519124e?arch=src\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-3.module%2Bel8.4.0%2B22765%2B91da4d3f?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-18.module%2Bel8.4.0%2B23967%2B1519124e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.15.14-18.module%2Bel8.4.0%2B23967%2B1519124e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.15.14-18.module%2Bel8.4.0%2B23967%2B1519124e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.15.14-18.module%2Bel8.4.0%2B23967%2B1519124e?arch=noarch\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.15.14-18.module%2Bel8.4.0%2B23967%2B1519124e?arch=noarch\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.15.14-18.module%2Bel8.4.0%2B23967%2B1519124e?arch=noarch\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.15.14-18.module%2Bel8.4.0%2B23967%2B1519124e?arch=noarch\u0026rpmmod=go-toolset:rhel8:8040020260205134630:5081a262"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T01:27:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2217"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.AUS:golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:go-toolset-0:1.15.14-3.module+el8.4.0+22765+91da4d3f.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-bin-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-docs-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-misc-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-race-0:1.15.14-18.module+el8.4.0+23967+1519124e.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-src-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.EUS.EXTENSION:golang-tests-0:1.15.14-18.module+el8.4.0+23967+1519124e.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1896
Vulnerability from csaf_redhat - Published: 2026-02-04 07:12 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Builds 1.6.3",
"title": "Topic"
},
{
"category": "general",
"text": "Releases of Red Hat OpenShift Builds 1.6.3",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1896",
"url": "https://access.redhat.com/errata/RHSA-2026:1896"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6",
"url": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1896.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.3",
"tracking": {
"current_release_date": "2026-02-11T08:53:08+00:00",
"generator": {
"date": "2026-02-11T08:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1896",
"initial_release_date": "2026-02-04T07:12:33+00:00",
"revision_history": [
{
"date": "2026-02-04T07:12:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-04T07:12:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Builds for Red Hat OpenShift 1.6.3",
"product": {
"name": "Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_builds:1.6::el9"
}
}
}
],
"category": "product_family",
"name": "Builds for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:b0adf55b4cb988d3a3df00617552c772edbc337d6c5d8d3b1aa53ff4f44656fc_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:b0adf55b4cb988d3a3df00617552c772edbc337d6c5d8d3b1aa53ff4f44656fc_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:b0adf55b4cb988d3a3df00617552c772edbc337d6c5d8d3b1aa53ff4f44656fc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3Ab0adf55b4cb988d3a3df00617552c772edbc337d6c5d8d3b1aa53ff4f44656fc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:aec28f00e028ed748238eb87f574744e5ddb317f4f14709d4c7eed1c23fc1843_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:aec28f00e028ed748238eb87f574744e5ddb317f4f14709d4c7eed1c23fc1843_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:aec28f00e028ed748238eb87f574744e5ddb317f4f14709d4c7eed1c23fc1843_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Aaec28f00e028ed748238eb87f574744e5ddb317f4f14709d4c7eed1c23fc1843?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597596"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d38b2ac44a2311034947ec54423ce569ec14c963013dfd7da0cd23d3f77dd6ea_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d38b2ac44a2311034947ec54423ce569ec14c963013dfd7da0cd23d3f77dd6ea_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d38b2ac44a2311034947ec54423ce569ec14c963013dfd7da0cd23d3f77dd6ea_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Ad38b2ac44a2311034947ec54423ce569ec14c963013dfd7da0cd23d3f77dd6ea?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597468"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:aac9e0e1878349cf8cf5a802889950a994ffad888bb7be52a6e6f602e7e157dc_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:aac9e0e1878349cf8cf5a802889950a994ffad888bb7be52a6e6f602e7e157dc_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:aac9e0e1878349cf8cf5a802889950a994ffad888bb7be52a6e6f602e7e157dc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3Aaac9e0e1878349cf8cf5a802889950a994ffad888bb7be52a6e6f602e7e157dc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769596973"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0bba2f388f0b0350a8cb6bec736849907fa5f03ca6e8988b68751c322446b2f_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0bba2f388f0b0350a8cb6bec736849907fa5f03ca6e8988b68751c322446b2f_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0bba2f388f0b0350a8cb6bec736849907fa5f03ca6e8988b68751c322446b2f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Ab0bba2f388f0b0350a8cb6bec736849907fa5f03ca6e8988b68751c322446b2f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769767340"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2fa8b3a1aded0b5bcfb4af48d9dd45890f3bc2c8b1602ea04779f676c2c8b371_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2fa8b3a1aded0b5bcfb4af48d9dd45890f3bc2c8b1602ea04779f676c2c8b371_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2fa8b3a1aded0b5bcfb4af48d9dd45890f3bc2c8b1602ea04779f676c2c8b371_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-operator-bundle@sha256%3A2fa8b3a1aded0b5bcfb4af48d9dd45890f3bc2c8b1602ea04779f676c2c8b371?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1770030768"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f07209340716676606f42dfea44c632b8a8477924f8e56d8f17abf7aeef8020d_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f07209340716676606f42dfea44c632b8a8477924f8e56d8f17abf7aeef8020d_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f07209340716676606f42dfea44c632b8a8477924f8e56d8f17abf7aeef8020d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Af07209340716676606f42dfea44c632b8a8477924f8e56d8f17abf7aeef8020d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769589421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6596c6bda3fef6b16e6b62abfa8cb0ac0fd8708e3f7b9d0f1df95ef365c97557_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6596c6bda3fef6b16e6b62abfa8cb0ac0fd8708e3f7b9d0f1df95ef365c97557_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6596c6bda3fef6b16e6b62abfa8cb0ac0fd8708e3f7b9d0f1df95ef365c97557_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A6596c6bda3fef6b16e6b62abfa8cb0ac0fd8708e3f7b9d0f1df95ef365c97557?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769589421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e037df5300ab5d9378ce7eb5392ccdbecb7dbb29d7728c96f981e096f4a9a278_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e037df5300ab5d9378ce7eb5392ccdbecb7dbb29d7728c96f981e096f4a9a278_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e037df5300ab5d9378ce7eb5392ccdbecb7dbb29d7728c96f981e096f4a9a278_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Ae037df5300ab5d9378ce7eb5392ccdbecb7dbb29d7728c96f981e096f4a9a278?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597410"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:93c3059b9cdd229f76af39ecadaf5b6e5bdd403ceb4142a3015dd08816b1467b_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:93c3059b9cdd229f76af39ecadaf5b6e5bdd403ceb4142a3015dd08816b1467b_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:93c3059b9cdd229f76af39ecadaf5b6e5bdd403ceb4142a3015dd08816b1467b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A93c3059b9cdd229f76af39ecadaf5b6e5bdd403ceb4142a3015dd08816b1467b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597229"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9a57129097c5d57f437062a969523ffbe5d27345878b748d8bfc6c11886b7c3d_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9a57129097c5d57f437062a969523ffbe5d27345878b748d8bfc6c11886b7c3d_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9a57129097c5d57f437062a969523ffbe5d27345878b748d8bfc6c11886b7c3d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A9a57129097c5d57f437062a969523ffbe5d27345878b748d8bfc6c11886b7c3d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7e2347fca8336997309e681401e6270e75c9f70592be3444ec03acca54822395_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7e2347fca8336997309e681401e6270e75c9f70592be3444ec03acca54822395_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7e2347fca8336997309e681401e6270e75c9f70592be3444ec03acca54822395_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A7e2347fca8336997309e681401e6270e75c9f70592be3444ec03acca54822395?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597596"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:750ef6786a25dc60bfff2f8cf8d4857393bc0ce737e154c1e42850f37811c82c_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:750ef6786a25dc60bfff2f8cf8d4857393bc0ce737e154c1e42850f37811c82c_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:750ef6786a25dc60bfff2f8cf8d4857393bc0ce737e154c1e42850f37811c82c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A750ef6786a25dc60bfff2f8cf8d4857393bc0ce737e154c1e42850f37811c82c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597468"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:1233519b461d0a83720b1d6539380ecc7de6f66521f7d0106cc5cd2bf62ede6f_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:1233519b461d0a83720b1d6539380ecc7de6f66521f7d0106cc5cd2bf62ede6f_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:1233519b461d0a83720b1d6539380ecc7de6f66521f7d0106cc5cd2bf62ede6f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A1233519b461d0a83720b1d6539380ecc7de6f66521f7d0106cc5cd2bf62ede6f?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769596973"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ac85e88acde38358da96c131fab0b0a809017f3a21d224be9ff0fe74e3edf162_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ac85e88acde38358da96c131fab0b0a809017f3a21d224be9ff0fe74e3edf162_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ac85e88acde38358da96c131fab0b0a809017f3a21d224be9ff0fe74e3edf162_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Aac85e88acde38358da96c131fab0b0a809017f3a21d224be9ff0fe74e3edf162?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769767340"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:92ee264238bbb8f85b1ce720ca9cf06341b4d5c5328c34ce195fb162403ca498_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:92ee264238bbb8f85b1ce720ca9cf06341b4d5c5328c34ce195fb162403ca498_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:92ee264238bbb8f85b1ce720ca9cf06341b4d5c5328c34ce195fb162403ca498_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A92ee264238bbb8f85b1ce720ca9cf06341b4d5c5328c34ce195fb162403ca498?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769589421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:19cc75d7b0faa973137a0337837a67f9c8a8b4f5a96a8519785ba00872a024db_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:19cc75d7b0faa973137a0337837a67f9c8a8b4f5a96a8519785ba00872a024db_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:19cc75d7b0faa973137a0337837a67f9c8a8b4f5a96a8519785ba00872a024db_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A19cc75d7b0faa973137a0337837a67f9c8a8b4f5a96a8519785ba00872a024db?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769589421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:363a5878d883440579525740aafadbf2c9a91b6a9aff3cc8523c9ad3377d4515_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:363a5878d883440579525740aafadbf2c9a91b6a9aff3cc8523c9ad3377d4515_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:363a5878d883440579525740aafadbf2c9a91b6a9aff3cc8523c9ad3377d4515_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A363a5878d883440579525740aafadbf2c9a91b6a9aff3cc8523c9ad3377d4515?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597410"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4e3e2d3f15f5a3111000589c936c2e9d1eacae948a684e5536513ba6c3227bb3_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4e3e2d3f15f5a3111000589c936c2e9d1eacae948a684e5536513ba6c3227bb3_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4e3e2d3f15f5a3111000589c936c2e9d1eacae948a684e5536513ba6c3227bb3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A4e3e2d3f15f5a3111000589c936c2e9d1eacae948a684e5536513ba6c3227bb3?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597229"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:4e4b385710b4614f19db66c911056845982400f088a954e61bf35a3999694446_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:4e4b385710b4614f19db66c911056845982400f088a954e61bf35a3999694446_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:4e4b385710b4614f19db66c911056845982400f088a954e61bf35a3999694446_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A4e4b385710b4614f19db66c911056845982400f088a954e61bf35a3999694446?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2f700dedf81a497e1cf3372618e6bee81b224fff16f77c46031f299c8620cd4e_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2f700dedf81a497e1cf3372618e6bee81b224fff16f77c46031f299c8620cd4e_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2f700dedf81a497e1cf3372618e6bee81b224fff16f77c46031f299c8620cd4e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A2f700dedf81a497e1cf3372618e6bee81b224fff16f77c46031f299c8620cd4e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597596"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:588547b296ff5ce40e84567ae25c143a68cfbdf636a079f358511e6e3dd71f6a_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:588547b296ff5ce40e84567ae25c143a68cfbdf636a079f358511e6e3dd71f6a_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:588547b296ff5ce40e84567ae25c143a68cfbdf636a079f358511e6e3dd71f6a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A588547b296ff5ce40e84567ae25c143a68cfbdf636a079f358511e6e3dd71f6a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597468"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2dcd54268c729dc5aed1e9b25e6a7a0651e33c812f2454484b213cb45687b008_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2dcd54268c729dc5aed1e9b25e6a7a0651e33c812f2454484b213cb45687b008_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2dcd54268c729dc5aed1e9b25e6a7a0651e33c812f2454484b213cb45687b008_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A2dcd54268c729dc5aed1e9b25e6a7a0651e33c812f2454484b213cb45687b008?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769596973"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89cf69c4d22314d922666a145c4306280c80661a7daa637fcd304434332c35a0_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89cf69c4d22314d922666a145c4306280c80661a7daa637fcd304434332c35a0_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89cf69c4d22314d922666a145c4306280c80661a7daa637fcd304434332c35a0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A89cf69c4d22314d922666a145c4306280c80661a7daa637fcd304434332c35a0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769767340"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7bf6d9341cb8fb552dcfead668dcd7dfaab51c4ca9ec85c75d5d020b0778c66b_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7bf6d9341cb8fb552dcfead668dcd7dfaab51c4ca9ec85c75d5d020b0778c66b_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7bf6d9341cb8fb552dcfead668dcd7dfaab51c4ca9ec85c75d5d020b0778c66b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A7bf6d9341cb8fb552dcfead668dcd7dfaab51c4ca9ec85c75d5d020b0778c66b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769589421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:980996b221397062a18dc9d3890a2557be551aadd6cd462300dc84c1963e82bd_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:980996b221397062a18dc9d3890a2557be551aadd6cd462300dc84c1963e82bd_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:980996b221397062a18dc9d3890a2557be551aadd6cd462300dc84c1963e82bd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A980996b221397062a18dc9d3890a2557be551aadd6cd462300dc84c1963e82bd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769589421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1d88234cfc0a5ba8013ccb3628bff90dacadb4785dc7d3c08ad42e05c3c1a5bc_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1d88234cfc0a5ba8013ccb3628bff90dacadb4785dc7d3c08ad42e05c3c1a5bc_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1d88234cfc0a5ba8013ccb3628bff90dacadb4785dc7d3c08ad42e05c3c1a5bc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A1d88234cfc0a5ba8013ccb3628bff90dacadb4785dc7d3c08ad42e05c3c1a5bc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597410"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c655fb69a55183f1ec3e78f89c9bbe8a7ac7351c10cdd4ecaa1ea99b852e0fa6_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c655fb69a55183f1ec3e78f89c9bbe8a7ac7351c10cdd4ecaa1ea99b852e0fa6_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c655fb69a55183f1ec3e78f89c9bbe8a7ac7351c10cdd4ecaa1ea99b852e0fa6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Ac655fb69a55183f1ec3e78f89c9bbe8a7ac7351c10cdd4ecaa1ea99b852e0fa6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597229"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ae6b37943b4ac95acb88e7475efab52d5dea9f56e8d4b720a55ea4b896a8d3_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ae6b37943b4ac95acb88e7475efab52d5dea9f56e8d4b720a55ea4b896a8d3_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ae6b37943b4ac95acb88e7475efab52d5dea9f56e8d4b720a55ea4b896a8d3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A18ae6b37943b4ac95acb88e7475efab52d5dea9f56e8d4b720a55ea4b896a8d3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:d0ad5ea494052b0ed4147426d112d50cf13104200be900e3a09808956e5f37dd_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:d0ad5ea494052b0ed4147426d112d50cf13104200be900e3a09808956e5f37dd_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:d0ad5ea494052b0ed4147426d112d50cf13104200be900e3a09808956e5f37dd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Ad0ad5ea494052b0ed4147426d112d50cf13104200be900e3a09808956e5f37dd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597596"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:dcc0ecbc2d27bce81f7b3ab3e406b7b7ab1c7a52d9d489c4e2ffaba310b03972_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:dcc0ecbc2d27bce81f7b3ab3e406b7b7ab1c7a52d9d489c4e2ffaba310b03972_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:dcc0ecbc2d27bce81f7b3ab3e406b7b7ab1c7a52d9d489c4e2ffaba310b03972_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Adcc0ecbc2d27bce81f7b3ab3e406b7b7ab1c7a52d9d489c4e2ffaba310b03972?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597468"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:27bf2a6e7e899fb487c94acb88638d6e46f151245e2ba8badcbe9ce56ca3c632_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:27bf2a6e7e899fb487c94acb88638d6e46f151245e2ba8badcbe9ce56ca3c632_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:27bf2a6e7e899fb487c94acb88638d6e46f151245e2ba8badcbe9ce56ca3c632_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A27bf2a6e7e899fb487c94acb88638d6e46f151245e2ba8badcbe9ce56ca3c632?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769596973"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b79b7b1d350388d4b2ca8405a8edd74c9f2b4513f582127e44bfdf29b2e3679a_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b79b7b1d350388d4b2ca8405a8edd74c9f2b4513f582127e44bfdf29b2e3679a_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b79b7b1d350388d4b2ca8405a8edd74c9f2b4513f582127e44bfdf29b2e3679a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Ab79b7b1d350388d4b2ca8405a8edd74c9f2b4513f582127e44bfdf29b2e3679a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769767340"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1209ef23e411a8d7b875faa3b977de6119019be3893374f86c5125cbb01ea9c8_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1209ef23e411a8d7b875faa3b977de6119019be3893374f86c5125cbb01ea9c8_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1209ef23e411a8d7b875faa3b977de6119019be3893374f86c5125cbb01ea9c8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A1209ef23e411a8d7b875faa3b977de6119019be3893374f86c5125cbb01ea9c8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769589421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b6ecc5d4860902476e4f2cad4fe36aa6b93cae50cad5f44098234824d882c9c2_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b6ecc5d4860902476e4f2cad4fe36aa6b93cae50cad5f44098234824d882c9c2_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b6ecc5d4860902476e4f2cad4fe36aa6b93cae50cad5f44098234824d882c9c2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ab6ecc5d4860902476e4f2cad4fe36aa6b93cae50cad5f44098234824d882c9c2?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769589421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:ad4bdc1a0203da3ebb8da2ed493e6b8c1fa14754ebdd6b2a918645418d71ef63_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:ad4bdc1a0203da3ebb8da2ed493e6b8c1fa14754ebdd6b2a918645418d71ef63_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:ad4bdc1a0203da3ebb8da2ed493e6b8c1fa14754ebdd6b2a918645418d71ef63_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Aad4bdc1a0203da3ebb8da2ed493e6b8c1fa14754ebdd6b2a918645418d71ef63?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597410"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:cdf475c0954d4d97d60e2b116aacedd39968dd71b210946a58b731a49f88332f_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:cdf475c0954d4d97d60e2b116aacedd39968dd71b210946a58b731a49f88332f_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:cdf475c0954d4d97d60e2b116aacedd39968dd71b210946a58b731a49f88332f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Acdf475c0954d4d97d60e2b116aacedd39968dd71b210946a58b731a49f88332f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1769597229"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ae6b37943b4ac95acb88e7475efab52d5dea9f56e8d4b720a55ea4b896a8d3_s390x as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ae6b37943b4ac95acb88e7475efab52d5dea9f56e8d4b720a55ea4b896a8d3_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ae6b37943b4ac95acb88e7475efab52d5dea9f56e8d4b720a55ea4b896a8d3_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:4e4b385710b4614f19db66c911056845982400f088a954e61bf35a3999694446_ppc64le as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:4e4b385710b4614f19db66c911056845982400f088a954e61bf35a3999694446_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:4e4b385710b4614f19db66c911056845982400f088a954e61bf35a3999694446_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9a57129097c5d57f437062a969523ffbe5d27345878b748d8bfc6c11886b7c3d_arm64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9a57129097c5d57f437062a969523ffbe5d27345878b748d8bfc6c11886b7c3d_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9a57129097c5d57f437062a969523ffbe5d27345878b748d8bfc6c11886b7c3d_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:b0adf55b4cb988d3a3df00617552c772edbc337d6c5d8d3b1aa53ff4f44656fc_amd64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:b0adf55b4cb988d3a3df00617552c772edbc337d6c5d8d3b1aa53ff4f44656fc_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:b0adf55b4cb988d3a3df00617552c772edbc337d6c5d8d3b1aa53ff4f44656fc_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2f700dedf81a497e1cf3372618e6bee81b224fff16f77c46031f299c8620cd4e_ppc64le as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2f700dedf81a497e1cf3372618e6bee81b224fff16f77c46031f299c8620cd4e_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2f700dedf81a497e1cf3372618e6bee81b224fff16f77c46031f299c8620cd4e_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7e2347fca8336997309e681401e6270e75c9f70592be3444ec03acca54822395_arm64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7e2347fca8336997309e681401e6270e75c9f70592be3444ec03acca54822395_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7e2347fca8336997309e681401e6270e75c9f70592be3444ec03acca54822395_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:aec28f00e028ed748238eb87f574744e5ddb317f4f14709d4c7eed1c23fc1843_amd64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:aec28f00e028ed748238eb87f574744e5ddb317f4f14709d4c7eed1c23fc1843_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:aec28f00e028ed748238eb87f574744e5ddb317f4f14709d4c7eed1c23fc1843_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:d0ad5ea494052b0ed4147426d112d50cf13104200be900e3a09808956e5f37dd_s390x as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:d0ad5ea494052b0ed4147426d112d50cf13104200be900e3a09808956e5f37dd_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:d0ad5ea494052b0ed4147426d112d50cf13104200be900e3a09808956e5f37dd_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:588547b296ff5ce40e84567ae25c143a68cfbdf636a079f358511e6e3dd71f6a_ppc64le as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:588547b296ff5ce40e84567ae25c143a68cfbdf636a079f358511e6e3dd71f6a_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:588547b296ff5ce40e84567ae25c143a68cfbdf636a079f358511e6e3dd71f6a_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:750ef6786a25dc60bfff2f8cf8d4857393bc0ce737e154c1e42850f37811c82c_arm64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:750ef6786a25dc60bfff2f8cf8d4857393bc0ce737e154c1e42850f37811c82c_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:750ef6786a25dc60bfff2f8cf8d4857393bc0ce737e154c1e42850f37811c82c_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d38b2ac44a2311034947ec54423ce569ec14c963013dfd7da0cd23d3f77dd6ea_amd64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d38b2ac44a2311034947ec54423ce569ec14c963013dfd7da0cd23d3f77dd6ea_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d38b2ac44a2311034947ec54423ce569ec14c963013dfd7da0cd23d3f77dd6ea_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:dcc0ecbc2d27bce81f7b3ab3e406b7b7ab1c7a52d9d489c4e2ffaba310b03972_s390x as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:dcc0ecbc2d27bce81f7b3ab3e406b7b7ab1c7a52d9d489c4e2ffaba310b03972_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:dcc0ecbc2d27bce81f7b3ab3e406b7b7ab1c7a52d9d489c4e2ffaba310b03972_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:1233519b461d0a83720b1d6539380ecc7de6f66521f7d0106cc5cd2bf62ede6f_arm64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:1233519b461d0a83720b1d6539380ecc7de6f66521f7d0106cc5cd2bf62ede6f_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:1233519b461d0a83720b1d6539380ecc7de6f66521f7d0106cc5cd2bf62ede6f_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:27bf2a6e7e899fb487c94acb88638d6e46f151245e2ba8badcbe9ce56ca3c632_s390x as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:27bf2a6e7e899fb487c94acb88638d6e46f151245e2ba8badcbe9ce56ca3c632_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:27bf2a6e7e899fb487c94acb88638d6e46f151245e2ba8badcbe9ce56ca3c632_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2dcd54268c729dc5aed1e9b25e6a7a0651e33c812f2454484b213cb45687b008_ppc64le as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2dcd54268c729dc5aed1e9b25e6a7a0651e33c812f2454484b213cb45687b008_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2dcd54268c729dc5aed1e9b25e6a7a0651e33c812f2454484b213cb45687b008_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:aac9e0e1878349cf8cf5a802889950a994ffad888bb7be52a6e6f602e7e157dc_amd64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:aac9e0e1878349cf8cf5a802889950a994ffad888bb7be52a6e6f602e7e157dc_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:aac9e0e1878349cf8cf5a802889950a994ffad888bb7be52a6e6f602e7e157dc_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2fa8b3a1aded0b5bcfb4af48d9dd45890f3bc2c8b1602ea04779f676c2c8b371_amd64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2fa8b3a1aded0b5bcfb4af48d9dd45890f3bc2c8b1602ea04779f676c2c8b371_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2fa8b3a1aded0b5bcfb4af48d9dd45890f3bc2c8b1602ea04779f676c2c8b371_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89cf69c4d22314d922666a145c4306280c80661a7daa637fcd304434332c35a0_ppc64le as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89cf69c4d22314d922666a145c4306280c80661a7daa637fcd304434332c35a0_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89cf69c4d22314d922666a145c4306280c80661a7daa637fcd304434332c35a0_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ac85e88acde38358da96c131fab0b0a809017f3a21d224be9ff0fe74e3edf162_arm64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ac85e88acde38358da96c131fab0b0a809017f3a21d224be9ff0fe74e3edf162_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ac85e88acde38358da96c131fab0b0a809017f3a21d224be9ff0fe74e3edf162_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0bba2f388f0b0350a8cb6bec736849907fa5f03ca6e8988b68751c322446b2f_amd64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0bba2f388f0b0350a8cb6bec736849907fa5f03ca6e8988b68751c322446b2f_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0bba2f388f0b0350a8cb6bec736849907fa5f03ca6e8988b68751c322446b2f_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b79b7b1d350388d4b2ca8405a8edd74c9f2b4513f582127e44bfdf29b2e3679a_s390x as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b79b7b1d350388d4b2ca8405a8edd74c9f2b4513f582127e44bfdf29b2e3679a_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b79b7b1d350388d4b2ca8405a8edd74c9f2b4513f582127e44bfdf29b2e3679a_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1209ef23e411a8d7b875faa3b977de6119019be3893374f86c5125cbb01ea9c8_s390x as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1209ef23e411a8d7b875faa3b977de6119019be3893374f86c5125cbb01ea9c8_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1209ef23e411a8d7b875faa3b977de6119019be3893374f86c5125cbb01ea9c8_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7bf6d9341cb8fb552dcfead668dcd7dfaab51c4ca9ec85c75d5d020b0778c66b_ppc64le as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7bf6d9341cb8fb552dcfead668dcd7dfaab51c4ca9ec85c75d5d020b0778c66b_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7bf6d9341cb8fb552dcfead668dcd7dfaab51c4ca9ec85c75d5d020b0778c66b_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:92ee264238bbb8f85b1ce720ca9cf06341b4d5c5328c34ce195fb162403ca498_arm64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:92ee264238bbb8f85b1ce720ca9cf06341b4d5c5328c34ce195fb162403ca498_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:92ee264238bbb8f85b1ce720ca9cf06341b4d5c5328c34ce195fb162403ca498_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f07209340716676606f42dfea44c632b8a8477924f8e56d8f17abf7aeef8020d_amd64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f07209340716676606f42dfea44c632b8a8477924f8e56d8f17abf7aeef8020d_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f07209340716676606f42dfea44c632b8a8477924f8e56d8f17abf7aeef8020d_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:19cc75d7b0faa973137a0337837a67f9c8a8b4f5a96a8519785ba00872a024db_arm64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:19cc75d7b0faa973137a0337837a67f9c8a8b4f5a96a8519785ba00872a024db_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:19cc75d7b0faa973137a0337837a67f9c8a8b4f5a96a8519785ba00872a024db_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6596c6bda3fef6b16e6b62abfa8cb0ac0fd8708e3f7b9d0f1df95ef365c97557_amd64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6596c6bda3fef6b16e6b62abfa8cb0ac0fd8708e3f7b9d0f1df95ef365c97557_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6596c6bda3fef6b16e6b62abfa8cb0ac0fd8708e3f7b9d0f1df95ef365c97557_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:980996b221397062a18dc9d3890a2557be551aadd6cd462300dc84c1963e82bd_ppc64le as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:980996b221397062a18dc9d3890a2557be551aadd6cd462300dc84c1963e82bd_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:980996b221397062a18dc9d3890a2557be551aadd6cd462300dc84c1963e82bd_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b6ecc5d4860902476e4f2cad4fe36aa6b93cae50cad5f44098234824d882c9c2_s390x as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b6ecc5d4860902476e4f2cad4fe36aa6b93cae50cad5f44098234824d882c9c2_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b6ecc5d4860902476e4f2cad4fe36aa6b93cae50cad5f44098234824d882c9c2_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1d88234cfc0a5ba8013ccb3628bff90dacadb4785dc7d3c08ad42e05c3c1a5bc_ppc64le as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1d88234cfc0a5ba8013ccb3628bff90dacadb4785dc7d3c08ad42e05c3c1a5bc_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1d88234cfc0a5ba8013ccb3628bff90dacadb4785dc7d3c08ad42e05c3c1a5bc_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:363a5878d883440579525740aafadbf2c9a91b6a9aff3cc8523c9ad3377d4515_arm64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:363a5878d883440579525740aafadbf2c9a91b6a9aff3cc8523c9ad3377d4515_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:363a5878d883440579525740aafadbf2c9a91b6a9aff3cc8523c9ad3377d4515_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:ad4bdc1a0203da3ebb8da2ed493e6b8c1fa14754ebdd6b2a918645418d71ef63_s390x as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:ad4bdc1a0203da3ebb8da2ed493e6b8c1fa14754ebdd6b2a918645418d71ef63_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:ad4bdc1a0203da3ebb8da2ed493e6b8c1fa14754ebdd6b2a918645418d71ef63_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e037df5300ab5d9378ce7eb5392ccdbecb7dbb29d7728c96f981e096f4a9a278_amd64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e037df5300ab5d9378ce7eb5392ccdbecb7dbb29d7728c96f981e096f4a9a278_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e037df5300ab5d9378ce7eb5392ccdbecb7dbb29d7728c96f981e096f4a9a278_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4e3e2d3f15f5a3111000589c936c2e9d1eacae948a684e5536513ba6c3227bb3_arm64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4e3e2d3f15f5a3111000589c936c2e9d1eacae948a684e5536513ba6c3227bb3_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4e3e2d3f15f5a3111000589c936c2e9d1eacae948a684e5536513ba6c3227bb3_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:93c3059b9cdd229f76af39ecadaf5b6e5bdd403ceb4142a3015dd08816b1467b_amd64 as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:93c3059b9cdd229f76af39ecadaf5b6e5bdd403ceb4142a3015dd08816b1467b_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:93c3059b9cdd229f76af39ecadaf5b6e5bdd403ceb4142a3015dd08816b1467b_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c655fb69a55183f1ec3e78f89c9bbe8a7ac7351c10cdd4ecaa1ea99b852e0fa6_ppc64le as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c655fb69a55183f1ec3e78f89c9bbe8a7ac7351c10cdd4ecaa1ea99b852e0fa6_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c655fb69a55183f1ec3e78f89c9bbe8a7ac7351c10cdd4ecaa1ea99b852e0fa6_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:cdf475c0954d4d97d60e2b116aacedd39968dd71b210946a58b731a49f88332f_s390x as a component of Builds for Red Hat OpenShift 1.6.3",
"product_id": "Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:cdf475c0954d4d97d60e2b116aacedd39968dd71b210946a58b731a49f88332f_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:cdf475c0954d4d97d60e2b116aacedd39968dd71b210946a58b731a49f88332f_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2fa8b3a1aded0b5bcfb4af48d9dd45890f3bc2c8b1602ea04779f676c2c8b371_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ae6b37943b4ac95acb88e7475efab52d5dea9f56e8d4b720a55ea4b896a8d3_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:4e4b385710b4614f19db66c911056845982400f088a954e61bf35a3999694446_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9a57129097c5d57f437062a969523ffbe5d27345878b748d8bfc6c11886b7c3d_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:b0adf55b4cb988d3a3df00617552c772edbc337d6c5d8d3b1aa53ff4f44656fc_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2f700dedf81a497e1cf3372618e6bee81b224fff16f77c46031f299c8620cd4e_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7e2347fca8336997309e681401e6270e75c9f70592be3444ec03acca54822395_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:aec28f00e028ed748238eb87f574744e5ddb317f4f14709d4c7eed1c23fc1843_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:d0ad5ea494052b0ed4147426d112d50cf13104200be900e3a09808956e5f37dd_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:588547b296ff5ce40e84567ae25c143a68cfbdf636a079f358511e6e3dd71f6a_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:750ef6786a25dc60bfff2f8cf8d4857393bc0ce737e154c1e42850f37811c82c_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d38b2ac44a2311034947ec54423ce569ec14c963013dfd7da0cd23d3f77dd6ea_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:dcc0ecbc2d27bce81f7b3ab3e406b7b7ab1c7a52d9d489c4e2ffaba310b03972_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:1233519b461d0a83720b1d6539380ecc7de6f66521f7d0106cc5cd2bf62ede6f_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:27bf2a6e7e899fb487c94acb88638d6e46f151245e2ba8badcbe9ce56ca3c632_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2dcd54268c729dc5aed1e9b25e6a7a0651e33c812f2454484b213cb45687b008_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:aac9e0e1878349cf8cf5a802889950a994ffad888bb7be52a6e6f602e7e157dc_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89cf69c4d22314d922666a145c4306280c80661a7daa637fcd304434332c35a0_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ac85e88acde38358da96c131fab0b0a809017f3a21d224be9ff0fe74e3edf162_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0bba2f388f0b0350a8cb6bec736849907fa5f03ca6e8988b68751c322446b2f_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b79b7b1d350388d4b2ca8405a8edd74c9f2b4513f582127e44bfdf29b2e3679a_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1209ef23e411a8d7b875faa3b977de6119019be3893374f86c5125cbb01ea9c8_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7bf6d9341cb8fb552dcfead668dcd7dfaab51c4ca9ec85c75d5d020b0778c66b_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:92ee264238bbb8f85b1ce720ca9cf06341b4d5c5328c34ce195fb162403ca498_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f07209340716676606f42dfea44c632b8a8477924f8e56d8f17abf7aeef8020d_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:19cc75d7b0faa973137a0337837a67f9c8a8b4f5a96a8519785ba00872a024db_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6596c6bda3fef6b16e6b62abfa8cb0ac0fd8708e3f7b9d0f1df95ef365c97557_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:980996b221397062a18dc9d3890a2557be551aadd6cd462300dc84c1963e82bd_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b6ecc5d4860902476e4f2cad4fe36aa6b93cae50cad5f44098234824d882c9c2_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1d88234cfc0a5ba8013ccb3628bff90dacadb4785dc7d3c08ad42e05c3c1a5bc_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:363a5878d883440579525740aafadbf2c9a91b6a9aff3cc8523c9ad3377d4515_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:ad4bdc1a0203da3ebb8da2ed493e6b8c1fa14754ebdd6b2a918645418d71ef63_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e037df5300ab5d9378ce7eb5392ccdbecb7dbb29d7728c96f981e096f4a9a278_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4e3e2d3f15f5a3111000589c936c2e9d1eacae948a684e5536513ba6c3227bb3_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:93c3059b9cdd229f76af39ecadaf5b6e5bdd403ceb4142a3015dd08816b1467b_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c655fb69a55183f1ec3e78f89c9bbe8a7ac7351c10cdd4ecaa1ea99b852e0fa6_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:cdf475c0954d4d97d60e2b116aacedd39968dd71b210946a58b731a49f88332f_s390x"
],
"known_not_affected": [
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2fa8b3a1aded0b5bcfb4af48d9dd45890f3bc2c8b1602ea04779f676c2c8b371_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T07:12:33+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.2 upgrades to to 1.6.3",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ae6b37943b4ac95acb88e7475efab52d5dea9f56e8d4b720a55ea4b896a8d3_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:4e4b385710b4614f19db66c911056845982400f088a954e61bf35a3999694446_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9a57129097c5d57f437062a969523ffbe5d27345878b748d8bfc6c11886b7c3d_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:b0adf55b4cb988d3a3df00617552c772edbc337d6c5d8d3b1aa53ff4f44656fc_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2f700dedf81a497e1cf3372618e6bee81b224fff16f77c46031f299c8620cd4e_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7e2347fca8336997309e681401e6270e75c9f70592be3444ec03acca54822395_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:aec28f00e028ed748238eb87f574744e5ddb317f4f14709d4c7eed1c23fc1843_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:d0ad5ea494052b0ed4147426d112d50cf13104200be900e3a09808956e5f37dd_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:588547b296ff5ce40e84567ae25c143a68cfbdf636a079f358511e6e3dd71f6a_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:750ef6786a25dc60bfff2f8cf8d4857393bc0ce737e154c1e42850f37811c82c_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d38b2ac44a2311034947ec54423ce569ec14c963013dfd7da0cd23d3f77dd6ea_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:dcc0ecbc2d27bce81f7b3ab3e406b7b7ab1c7a52d9d489c4e2ffaba310b03972_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:1233519b461d0a83720b1d6539380ecc7de6f66521f7d0106cc5cd2bf62ede6f_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:27bf2a6e7e899fb487c94acb88638d6e46f151245e2ba8badcbe9ce56ca3c632_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2dcd54268c729dc5aed1e9b25e6a7a0651e33c812f2454484b213cb45687b008_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:aac9e0e1878349cf8cf5a802889950a994ffad888bb7be52a6e6f602e7e157dc_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89cf69c4d22314d922666a145c4306280c80661a7daa637fcd304434332c35a0_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ac85e88acde38358da96c131fab0b0a809017f3a21d224be9ff0fe74e3edf162_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0bba2f388f0b0350a8cb6bec736849907fa5f03ca6e8988b68751c322446b2f_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b79b7b1d350388d4b2ca8405a8edd74c9f2b4513f582127e44bfdf29b2e3679a_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1209ef23e411a8d7b875faa3b977de6119019be3893374f86c5125cbb01ea9c8_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7bf6d9341cb8fb552dcfead668dcd7dfaab51c4ca9ec85c75d5d020b0778c66b_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:92ee264238bbb8f85b1ce720ca9cf06341b4d5c5328c34ce195fb162403ca498_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f07209340716676606f42dfea44c632b8a8477924f8e56d8f17abf7aeef8020d_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:19cc75d7b0faa973137a0337837a67f9c8a8b4f5a96a8519785ba00872a024db_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6596c6bda3fef6b16e6b62abfa8cb0ac0fd8708e3f7b9d0f1df95ef365c97557_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:980996b221397062a18dc9d3890a2557be551aadd6cd462300dc84c1963e82bd_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b6ecc5d4860902476e4f2cad4fe36aa6b93cae50cad5f44098234824d882c9c2_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1d88234cfc0a5ba8013ccb3628bff90dacadb4785dc7d3c08ad42e05c3c1a5bc_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:363a5878d883440579525740aafadbf2c9a91b6a9aff3cc8523c9ad3377d4515_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:ad4bdc1a0203da3ebb8da2ed493e6b8c1fa14754ebdd6b2a918645418d71ef63_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e037df5300ab5d9378ce7eb5392ccdbecb7dbb29d7728c96f981e096f4a9a278_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4e3e2d3f15f5a3111000589c936c2e9d1eacae948a684e5536513ba6c3227bb3_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:93c3059b9cdd229f76af39ecadaf5b6e5bdd403ceb4142a3015dd08816b1467b_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c655fb69a55183f1ec3e78f89c9bbe8a7ac7351c10cdd4ecaa1ea99b852e0fa6_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:cdf475c0954d4d97d60e2b116aacedd39968dd71b210946a58b731a49f88332f_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1896"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ae6b37943b4ac95acb88e7475efab52d5dea9f56e8d4b720a55ea4b896a8d3_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:4e4b385710b4614f19db66c911056845982400f088a954e61bf35a3999694446_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9a57129097c5d57f437062a969523ffbe5d27345878b748d8bfc6c11886b7c3d_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:b0adf55b4cb988d3a3df00617552c772edbc337d6c5d8d3b1aa53ff4f44656fc_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2f700dedf81a497e1cf3372618e6bee81b224fff16f77c46031f299c8620cd4e_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7e2347fca8336997309e681401e6270e75c9f70592be3444ec03acca54822395_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:aec28f00e028ed748238eb87f574744e5ddb317f4f14709d4c7eed1c23fc1843_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:d0ad5ea494052b0ed4147426d112d50cf13104200be900e3a09808956e5f37dd_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:588547b296ff5ce40e84567ae25c143a68cfbdf636a079f358511e6e3dd71f6a_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:750ef6786a25dc60bfff2f8cf8d4857393bc0ce737e154c1e42850f37811c82c_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d38b2ac44a2311034947ec54423ce569ec14c963013dfd7da0cd23d3f77dd6ea_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:dcc0ecbc2d27bce81f7b3ab3e406b7b7ab1c7a52d9d489c4e2ffaba310b03972_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:1233519b461d0a83720b1d6539380ecc7de6f66521f7d0106cc5cd2bf62ede6f_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:27bf2a6e7e899fb487c94acb88638d6e46f151245e2ba8badcbe9ce56ca3c632_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2dcd54268c729dc5aed1e9b25e6a7a0651e33c812f2454484b213cb45687b008_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:aac9e0e1878349cf8cf5a802889950a994ffad888bb7be52a6e6f602e7e157dc_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2fa8b3a1aded0b5bcfb4af48d9dd45890f3bc2c8b1602ea04779f676c2c8b371_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89cf69c4d22314d922666a145c4306280c80661a7daa637fcd304434332c35a0_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ac85e88acde38358da96c131fab0b0a809017f3a21d224be9ff0fe74e3edf162_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b0bba2f388f0b0350a8cb6bec736849907fa5f03ca6e8988b68751c322446b2f_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b79b7b1d350388d4b2ca8405a8edd74c9f2b4513f582127e44bfdf29b2e3679a_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1209ef23e411a8d7b875faa3b977de6119019be3893374f86c5125cbb01ea9c8_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7bf6d9341cb8fb552dcfead668dcd7dfaab51c4ca9ec85c75d5d020b0778c66b_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:92ee264238bbb8f85b1ce720ca9cf06341b4d5c5328c34ce195fb162403ca498_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f07209340716676606f42dfea44c632b8a8477924f8e56d8f17abf7aeef8020d_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:19cc75d7b0faa973137a0337837a67f9c8a8b4f5a96a8519785ba00872a024db_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6596c6bda3fef6b16e6b62abfa8cb0ac0fd8708e3f7b9d0f1df95ef365c97557_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:980996b221397062a18dc9d3890a2557be551aadd6cd462300dc84c1963e82bd_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b6ecc5d4860902476e4f2cad4fe36aa6b93cae50cad5f44098234824d882c9c2_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1d88234cfc0a5ba8013ccb3628bff90dacadb4785dc7d3c08ad42e05c3c1a5bc_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:363a5878d883440579525740aafadbf2c9a91b6a9aff3cc8523c9ad3377d4515_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:ad4bdc1a0203da3ebb8da2ed493e6b8c1fa14754ebdd6b2a918645418d71ef63_s390x",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e037df5300ab5d9378ce7eb5392ccdbecb7dbb29d7728c96f981e096f4a9a278_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4e3e2d3f15f5a3111000589c936c2e9d1eacae948a684e5536513ba6c3227bb3_arm64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:93c3059b9cdd229f76af39ecadaf5b6e5bdd403ceb4142a3015dd08816b1467b_amd64",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c655fb69a55183f1ec3e78f89c9bbe8a7ac7351c10cdd4ecaa1ea99b852e0fa6_ppc64le",
"Builds for Red Hat OpenShift 1.6.3:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:cdf475c0954d4d97d60e2b116aacedd39968dd71b210946a58b731a49f88332f_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2343
Vulnerability from csaf_redhat - Published: 2026-02-09 14:20 - Updated: 2026-02-11 12:59Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new version of OpenShift API for Data Protection (OADP) is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift API for Data Protection (OADP) enables you to back up and restore\napplication resources, persistent volume data, and internal container\nimages to external backup storage. OADP enables both file system-based and\nsnapshot-based backups for persistent volumes.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2343",
"url": "https://access.redhat.com/errata/RHSA-2026:2343"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-25621",
"url": "https://access.redhat.com/security/cve/CVE-2024-25621"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52881",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/backup_and_restore/oadp-application-backup-and-restore",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/backup_and_restore/oadp-application-backup-and-restore"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2343.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift API for Data Protection",
"tracking": {
"current_release_date": "2026-02-11T12:59:33+00:00",
"generator": {
"date": "2026-02-11T12:59:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2343",
"initial_release_date": "2026-02-09T14:20:06+00:00",
"revision_history": [
{
"date": "2026-02-09T14:20:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T14:20:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T12:59:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift API for Data Protection 1.5",
"product": {
"name": "OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_api_data_protection:1.5::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift API for Data Protection"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"product_id": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-hypershift-velero-plugin-rhel9@sha256%3A2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768615081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"product_id": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel9@sha256%3Ad3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768597155"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"product_id": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-mustgather-rhel9@sha256%3Ac0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768627772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"product_id": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-non-admin-rhel9@sha256%3Afacd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768636701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"product_id": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-rhel9-operator@sha256%3A3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640301"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-rhel9@sha256%3Ae9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768624122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-rhel9@sha256%3Acfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768602558"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel9@sha256%3A45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768595491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel9@sha256%3A8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768625890"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-legacy-aws-rhel9@sha256%3Af2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768618777"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256%3A2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640265"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"product_id": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-hypershift-velero-plugin-rhel9@sha256%3A947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768615081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"product_id": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel9@sha256%3A0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768597155"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"product_id": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-mustgather-rhel9@sha256%3A77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768627772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"product_id": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-non-admin-rhel9@sha256%3A217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768636701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"product_id": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-rhel9-operator@sha256%3A8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640301"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-rhel9@sha256%3A152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768624122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-rhel9@sha256%3Ae0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768602558"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel9@sha256%3Ac390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768595491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel9@sha256%3A939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768625890"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-legacy-aws-rhel9@sha256%3A39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768618777"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256%3Aeb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640265"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"product_id": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-hypershift-velero-plugin-rhel9@sha256%3A28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768615081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"product_id": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel9@sha256%3A26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768597155"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"product_id": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-mustgather-rhel9@sha256%3Aa28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768627772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"product_id": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-non-admin-rhel9@sha256%3Ae80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768636701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"product_id": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-rhel9-operator@sha256%3A79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640301"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-rhel9@sha256%3A432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768624122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-rhel9@sha256%3Ae3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768602558"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel9@sha256%3Add6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768595491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel9@sha256%3A8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768625890"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-legacy-aws-rhel9@sha256%3A0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768618777"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256%3Af4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640265"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-hypershift-velero-plugin-rhel9@sha256%3A422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768615081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel9@sha256%3Acabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768597155"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-mustgather-rhel9@sha256%3A803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768627772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-non-admin-rhel9@sha256%3Af00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768636701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-rhel9-operator@sha256%3Afb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640301"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-rhel9@sha256%3A38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768624122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-rhel9@sha256%3Aac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768602558"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel9@sha256%3A15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768595491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel9@sha256%3Af98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768625890"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-legacy-aws-rhel9@sha256%3A12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768618777"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256%3A815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640265"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-25621",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T19:01:04.402278+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413190"
}
],
"notes": [
{
"category": "description",
"text": "containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/containerd/containerd: containerd local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64"
],
"known_not_affected": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-25621"
},
{
"category": "external",
"summary": "RHBZ#2413190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413190"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-25621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25621"
},
{
"category": "external",
"summary": "https://github.com/containerd/containerd/blob/main/docs/rootless.md",
"url": "https://github.com/containerd/containerd/blob/main/docs/rootless.md"
},
{
"category": "external",
"summary": "https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5",
"url": "https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5"
},
{
"category": "external",
"summary": "https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w",
"url": "https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w"
}
],
"release_date": "2025-11-06T18:36:21.566000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T14:20:06+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2343"
},
{
"category": "workaround",
"details": "The system administrator on the host can manually chmod the directories to not\nhave group or world accessible permissions:\n```\nchmod 700 /var/lib/containerd\nchmod 700 /run/containerd/io.containerd.grpc.v1.cri\nchmod 700 /run/containerd/io.containerd.sandbox.controller.v1.shim\n```\nAn alternative mitigation would be to run containerd in rootless mode.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/containerd/containerd: containerd local privilege escalation"
},
{
"cve": "CVE-2025-52881",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:19:18.652000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404715"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x"
],
"known_not_affected": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "RHBZ#2404715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/selinux/pull/237",
"url": "https://github.com/opencontainers/selinux/pull/237"
}
],
"release_date": "2025-11-05T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T14:20:06+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2343"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using rootless containers, as doing so will block most of the inadvertent writes (runc would run with reduced privileges, making attempts to write to procfs files ineffective).\n* Based on our analysis, neither AppArmor or SELinux can protect against the full version of the redirected write attack. The container runtime is generally privileged enough to write to arbitrary procfs files, which is more than sufficient to cause a container breakout.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
],
"known_not_affected": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T14:20:06+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2343"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x"
],
"known_not_affected": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T14:20:06+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2343"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1845
Vulnerability from csaf_redhat - Published: 2026-02-03 16:03 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for the Red Hat build of Cryostat 4 on RHEL 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for the Red Hat build of Cryostat 4 on RHEL 9.\n\nSecurity Fix(es):\n\n* lodash: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1845",
"url": "https://access.redhat.com/errata/RHSA-2026:1845"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2431740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431740"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1845.json"
}
],
"title": "Red Hat Security Advisory: Red Hat build of Cryostat security update",
"tracking": {
"current_release_date": "2026-02-11T08:53:07+00:00",
"generator": {
"date": "2026-02-11T08:53:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1845",
"initial_release_date": "2026-02-03T16:03:10+00:00",
"revision_history": [
{
"date": "2026-02-03T16:03:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-03T16:03:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Cryostat 4 on RHEL 9",
"product": {
"name": "Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cryostat:4::el9"
}
}
}
],
"category": "product_family",
"name": "Cryostat"
},
{
"branches": [
{
"category": "product_version",
"name": "cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64",
"product": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64",
"product_id": "cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-agent-init-rhel9\u0026tag=0.6.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64",
"product": {
"name": "cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64",
"product_id": "cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-db-rhel9\u0026tag=4.1.0-22"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64",
"product": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64",
"product_id": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-grafana-dashboard-rhel9\u0026tag=4.1.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64",
"product": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64",
"product_id": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-openshift-console-plugin-rhel9\u0026tag=4.1.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64",
"product": {
"name": "cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64",
"product_id": "cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-reports-rhel9\u0026tag=4.1.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64",
"product": {
"name": "cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64",
"product_id": "cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9\u0026tag=4.1.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64",
"product": {
"name": "cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64",
"product_id": "cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-operator-bundle\u0026tag=4.1.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64",
"product": {
"name": "cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64",
"product_id": "cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9-operator\u0026tag=4.1.0-22"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64",
"product": {
"name": "cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64",
"product_id": "cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-storage-rhel9\u0026tag=4.1.0-22"
}
}
},
{
"category": "product_version",
"name": "cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64",
"product": {
"name": "cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64",
"product_id": "cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/jfr-datasource-rhel9\u0026tag=4.1.0-17"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64",
"product": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64",
"product_id": "cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-agent-init-rhel9\u0026tag=0.6.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64",
"product": {
"name": "cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64",
"product_id": "cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-db-rhel9\u0026tag=4.1.0-22"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64",
"product": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64",
"product_id": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-grafana-dashboard-rhel9\u0026tag=4.1.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64",
"product": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64",
"product_id": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-openshift-console-plugin-rhel9\u0026tag=4.1.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64",
"product": {
"name": "cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64",
"product_id": "cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-reports-rhel9\u0026tag=4.1.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64",
"product": {
"name": "cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64",
"product_id": "cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9\u0026tag=4.1.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64",
"product": {
"name": "cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64",
"product_id": "cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-operator-bundle\u0026tag=4.1.0-17"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64",
"product": {
"name": "cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64",
"product_id": "cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9-operator\u0026tag=4.1.0-22"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64",
"product": {
"name": "cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64",
"product_id": "cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-storage-rhel9\u0026tag=4.1.0-22"
}
}
},
{
"category": "product_version",
"name": "cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64",
"product": {
"name": "cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64",
"product_id": "cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/jfr-datasource-rhel9\u0026tag=4.1.0-17"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64"
},
"product_reference": "cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64"
},
"product_reference": "cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64"
},
"product_reference": "cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64"
},
"product_reference": "cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64"
},
"product_reference": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64"
},
"product_reference": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64"
},
"product_reference": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64"
},
"product_reference": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64"
},
"product_reference": "cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64"
},
"product_reference": "cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64"
},
"product_reference": "cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64"
},
"product_reference": "cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64"
},
"product_reference": "cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64"
},
"product_reference": "cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64"
},
"product_reference": "cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64"
},
"product_reference": "cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64"
},
"product_reference": "cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64"
},
"product_reference": "cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64"
},
"product_reference": "cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64"
},
"product_reference": "cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13465",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2026-01-21T20:01:28.774829+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431740"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Lodash. A prototype pollution vulnerability in the _.unset and _.omit functions allows an attacker able to control property paths to delete methods from global prototypes. By removing essential functionalities, this can result in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: prototype pollution in _.unset and _.omit functions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable by applications using the _.unset and _.omit functions on an object and allowing user input to determine the path of the property to be removed. This issue only allows the deletion of properties but does not allow overwriting their behavior, limiting the impact to a denial of service. Due to this reason, this vulnerability has been rated with an important severity.\n\nIn Grafana, JavaScript code runs only in the browser, while the server side is all Golang. Therefore, the worst-case scenario is a loss of functionality in the client application inside the browser. To reflect this, the CVSS availability metric and the severity of the Grafana and the Grafana-PCP component have been updated to low and moderate, respectively.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64"
],
"known_not_affected": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "RHBZ#2431740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
"url": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg"
}
],
"release_date": "2026-01-21T19:05:28.846000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-03T16:03:10+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1845"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement strict input validation before passing any property paths to the _.unset and _.omit functions to block attempts to access the prototype chain. Ensure that strings like __proto__, constructor and prototype are blocked, for example.",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: prototype pollution in _.unset and _.omit functions"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64"
],
"known_not_affected": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-03T16:03:10+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1845"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:3a75004a386d2bf4b584223771d68c68d3427b63b407460dfb191b7749c3bf2b_amd64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:b82d92ac78e25087e561504bad3807ea18a33d63ab793864fb7d30ecb912f0ba_arm64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:0aef42d9a7e35ecabb504a175eb0a1b20a0f0766a72343c742ed9b8db5f26949_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:dea99ab6872a6341decefc51890636de99213176653386fe5d8bc18cc1b6df34_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:add54a1ef1e49c831b4a2ade3da785b400bbfd89081e741d80ca31f791595e02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:d679915df6424ec97422ea0cdb3bde5328317db82442cd926f13435e616461dd_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:0bac59ee4cb3cc16ad5be85929901ccdb60a90aeb8d6e9c5ab8f0672aa807b58_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:67f723dc0ce5d6b5d217e9df119a6b24a0a44d4bcca645144d8fec808e402e59_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:8a62abfc3d67785e363203466f56ca230d1a2af9cb4e29a0ba743feed2a850d2_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:f74fa0e3433e0f456d6449c23fffbc7e76c962e21bddea294486de6c102110da_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:08c55db955986b86d663690097260c47d5d7a48ff54868015a1cf24d007fb369_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:2627c1495f16419a5e34add58469bc666bf55952f7fedc9cc74722ac8723d76e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:676c921b3dabb4261f5ccbf4940500c57ae8da0db8324d18b7a3267c3946d0d5_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:8dc560b4e90178db5d17c0760da1d03983b91bb9aac943c53cfa6c629094f6ea_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:b013dd38437afb1efa38f8fb2d51bbb1fc6f7e29cc1c1de993306d700e63a18e_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1a241d0e4992137cab559814d108648da3c3546c1052fb7f5ea4529f6cb40d4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:04e0353e7d4d6f4c519d421bcf4276c91646493026c6ebb2f5d7f036ff793eff_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:cac5cec9aab5e40826174186765191306d3bd47938f9d7a5d10908dd5297c74e_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:2ae0dbddcc4307ec548ec63e00072b71921f35b963d880659109be4f20aafeee_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:42f428c0ee462ac2b474499ed80dc73aeabdba5cbec4a0d686b519df8d92ac86_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2376
Vulnerability from csaf_redhat - Published: 2026-02-09 23:40 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Web Terminal Operator 1.14.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "The Web Terminal provides a way to access a fully in-browser terminal emulator within the OpenShift Console. Command-line tools for interacting with the OpenShift cluster are pre-installed.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2376",
"url": "https://access.redhat.com/errata/RHSA-2026:2376"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2376.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Web Terminal Operator 1.14.0 release.",
"tracking": {
"current_release_date": "2026-02-11T08:53:20+00:00",
"generator": {
"date": "2026-02-11T08:53:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2376",
"initial_release_date": "2026-02-09T23:40:14+00:00",
"revision_history": [
{
"date": "2026-02-09T23:40:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T23:40:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Web Terminal 1.14",
"product": {
"name": "Red Hat Web Terminal 1.14",
"product_id": "Red Hat Web Terminal 1.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:webterminal:1.14::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Web Terminal"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:144ba08666c75a09a9a6ef6bec0d9129fce2707dc64b19c4b5047d2effa71ec7_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:144ba08666c75a09a9a6ef6bec0d9129fce2707dc64b19c4b5047d2effa71ec7_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:144ba08666c75a09a9a6ef6bec0d9129fce2707dc64b19c4b5047d2effa71ec7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-exec-rhel9@sha256%3A144ba08666c75a09a9a6ef6bec0d9129fce2707dc64b19c4b5047d2effa71ec7?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770679032"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:2a364f01054f944357ec8078248074c3a3a1bdceb13b2edc35d112958cc12a85_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:2a364f01054f944357ec8078248074c3a3a1bdceb13b2edc35d112958cc12a85_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:2a364f01054f944357ec8078248074c3a3a1bdceb13b2edc35d112958cc12a85_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-rhel9-operator@sha256%3A2a364f01054f944357ec8078248074c3a3a1bdceb13b2edc35d112958cc12a85?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770679038"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:b4734c75c7e8da889196cad5651ba4bd307ecf0d5ace81c65023a3e7b991d13f_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:b4734c75c7e8da889196cad5651ba4bd307ecf0d5ace81c65023a3e7b991d13f_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:b4734c75c7e8da889196cad5651ba4bd307ecf0d5ace81c65023a3e7b991d13f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-operator-bundle@sha256%3Ab4734c75c7e8da889196cad5651ba4bd307ecf0d5ace81c65023a3e7b991d13f?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770679001"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:9e4f42f11859396c873cf51eca4fe18c804d37c1e8e2697c3aa7da0fad390e43_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:9e4f42f11859396c873cf51eca4fe18c804d37c1e8e2697c3aa7da0fad390e43_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:9e4f42f11859396c873cf51eca4fe18c804d37c1e8e2697c3aa7da0fad390e43_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-tooling-rhel9@sha256%3A9e4f42f11859396c873cf51eca4fe18c804d37c1e8e2697c3aa7da0fad390e43?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770679041"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:144ba08666c75a09a9a6ef6bec0d9129fce2707dc64b19c4b5047d2effa71ec7_amd64 as a component of Red Hat Web Terminal 1.14",
"product_id": "Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:144ba08666c75a09a9a6ef6bec0d9129fce2707dc64b19c4b5047d2effa71ec7_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:144ba08666c75a09a9a6ef6bec0d9129fce2707dc64b19c4b5047d2effa71ec7_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:b4734c75c7e8da889196cad5651ba4bd307ecf0d5ace81c65023a3e7b991d13f_amd64 as a component of Red Hat Web Terminal 1.14",
"product_id": "Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:b4734c75c7e8da889196cad5651ba4bd307ecf0d5ace81c65023a3e7b991d13f_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:b4734c75c7e8da889196cad5651ba4bd307ecf0d5ace81c65023a3e7b991d13f_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:2a364f01054f944357ec8078248074c3a3a1bdceb13b2edc35d112958cc12a85_amd64 as a component of Red Hat Web Terminal 1.14",
"product_id": "Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:2a364f01054f944357ec8078248074c3a3a1bdceb13b2edc35d112958cc12a85_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:2a364f01054f944357ec8078248074c3a3a1bdceb13b2edc35d112958cc12a85_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:9e4f42f11859396c873cf51eca4fe18c804d37c1e8e2697c3aa7da0fad390e43_amd64 as a component of Red Hat Web Terminal 1.14",
"product_id": "Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:9e4f42f11859396c873cf51eca4fe18c804d37c1e8e2697c3aa7da0fad390e43_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:9e4f42f11859396c873cf51eca4fe18c804d37c1e8e2697c3aa7da0fad390e43_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:b4734c75c7e8da889196cad5651ba4bd307ecf0d5ace81c65023a3e7b991d13f_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:2a364f01054f944357ec8078248074c3a3a1bdceb13b2edc35d112958cc12a85_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:9e4f42f11859396c873cf51eca4fe18c804d37c1e8e2697c3aa7da0fad390e43_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:144ba08666c75a09a9a6ef6bec0d9129fce2707dc64b19c4b5047d2effa71ec7_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:b4734c75c7e8da889196cad5651ba4bd307ecf0d5ace81c65023a3e7b991d13f_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:2a364f01054f944357ec8078248074c3a3a1bdceb13b2edc35d112958cc12a85_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:9e4f42f11859396c873cf51eca4fe18c804d37c1e8e2697c3aa7da0fad390e43_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T23:40:14+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.19 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:144ba08666c75a09a9a6ef6bec0d9129fce2707dc64b19c4b5047d2effa71ec7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2376"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:144ba08666c75a09a9a6ef6bec0d9129fce2707dc64b19c4b5047d2effa71ec7_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:b4734c75c7e8da889196cad5651ba4bd307ecf0d5ace81c65023a3e7b991d13f_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:2a364f01054f944357ec8078248074c3a3a1bdceb13b2edc35d112958cc12a85_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:9e4f42f11859396c873cf51eca4fe18c804d37c1e8e2697c3aa7da0fad390e43_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2456
Vulnerability from csaf_redhat - Published: 2026-02-10 17:06 - Updated: 2026-02-11 12:59Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Dev Spaces 3.26.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Dev Spaces provides a cloud developer workspace server and a browser-based IDE built for teams and organizations. Dev Spaces runs in OpenShift and is well-suited for container-based development.\nThe 3.26 release is based on Eclipse Che 7.113 and uses the DevWorkspace engine to provide support for workspaces based on devfile v2.1 and v2.2.\nUsers still using the v1 standard should migrate as soon as possible.\nhttps://devfile.io/docs/2.2.0/migrating-to-devfile-v2\nDev Spaces supports OpenShift EUS releases v4.16 and higher. Users are expected to update to supported OpenShift releases in order to continue to get Dev Spaces updates.\nhttps://access.redhat.com/support/policy/updates/openshift#crw",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2456",
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.26/html/administration_guide/installing-devspaces",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.26/html/administration_guide/installing-devspaces"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-25621",
"url": "https://access.redhat.com/security/cve/CVE-2024-25621"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52881",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64756",
"url": "https://access.redhat.com/security/cve/CVE-2025-64756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-65945",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66031",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66490",
"url": "https://access.redhat.com/security/cve/CVE-2025-66490"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22029",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2456.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.0 Release.",
"tracking": {
"current_release_date": "2026-02-11T12:59:37+00:00",
"generator": {
"date": "2026-02-11T12:59:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2456",
"initial_release_date": "2026-02-10T17:06:01+00:00",
"revision_history": [
{
"date": "2026-02-10T17:06:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-10T17:06:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T12:59:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product": {
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_devspaces:3.26::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS)"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769804221"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3A51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769791331"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3Ae0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769595755"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3Aba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769685154"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769539518"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3A4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770052193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769466457"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Ab709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769691754"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3Afd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769797105"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-operator-bundle@sha256%3Ac72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770186534"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769869786"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769680738"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3Ae8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769638073"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770164598"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel10@sha256%3Acc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770046359"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3Acc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770162394"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769804221"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3Ac4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769791331"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769595755"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769685154"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769539518"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3A6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770052193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769466457"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Affe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769691754"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769797105"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3Afd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769869786"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769680738"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769638073"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Af592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770164598"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel10@sha256%3Aa05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770046359"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3A276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770162394"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3Aaa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769804221"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3Aeaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769791331"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3Af818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769595755"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769685154"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769539518"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3A55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770052193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3Abe63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769466457"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Ade30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769691754"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3Abc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769797105"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769869786"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769680738"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769638073"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Ab520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770164598"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel10@sha256%3A7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770046359"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3Ab998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770162394"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3Aa85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769804221"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3Ae2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769791331"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769595755"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769685154"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769539518"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3A819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770052193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3Ac06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769466457"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769691754"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3Ab8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769797105"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3Abc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769869786"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769680738"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1769638073"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Ada6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770164598"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel10@sha256%3Ab4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770046359"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3A10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770162394"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-25621",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T19:01:04.402278+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413190"
}
],
"notes": [
{
"category": "description",
"text": "containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/containerd/containerd: containerd local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-25621"
},
{
"category": "external",
"summary": "RHBZ#2413190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413190"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-25621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25621"
},
{
"category": "external",
"summary": "https://github.com/containerd/containerd/blob/main/docs/rootless.md",
"url": "https://github.com/containerd/containerd/blob/main/docs/rootless.md"
},
{
"category": "external",
"summary": "https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5",
"url": "https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5"
},
{
"category": "external",
"summary": "https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w",
"url": "https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w"
}
],
"release_date": "2025-11-06T18:36:21.566000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "workaround",
"details": "The system administrator on the host can manually chmod the directories to not\nhave group or world accessible permissions:\n```\nchmod 700 /var/lib/containerd\nchmod 700 /run/containerd/io.containerd.grpc.v1.cri\nchmod 700 /run/containerd/io.containerd.sandbox.controller.v1.shim\n```\nAn alternative mitigation would be to run containerd in rootless mode.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/containerd/containerd: containerd local privilege escalation"
},
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-52881",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:19:18.652000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404715"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "RHBZ#2404715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/selinux/pull/237",
"url": "https://github.com/opencontainers/selinux/pull/237"
}
],
"release_date": "2025-11-05T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using rootless containers, as doing so will block most of the inadvertent writes (runc would run with reduced privileges, making attempts to write to procfs files ineffective).\n* Based on our analysis, neither AppArmor or SELinux can protect against the full version of the redirected write attack. The container runtime is generally privileged enough to write to arbitrary procfs files, which is more than sufficient to cause a container breakout.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-64756",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2025-11-17T18:01:28.077927+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2415451"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in glob. This vulnerability allows arbitrary command execution via processing files with malicious names when the glob command-line interface (CLI) is used with the -c/--cmd option, enabling shell metacharacters to trigger command injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glob: glob: Command Injection Vulnerability via Malicious Filenames",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw in glob allows arbitrary command execution when the `glob` command-line interface is used with the `-c/--cmd` option to process files with malicious names. The vulnerability is triggered by shell metacharacters in filenames, leading to command injection. The glob CLI tool utilizes the -c option to execute shell commands over the files which matched the searched pattern by using the shell:true parameter when creating the subprocess which will further execute the command informed via \u0027-c\u0027 option, this parameter allows the shell meta characters to be used and processed when executing the command. Given that information glob misses to sanitize the file name to eliminate such characters and expressions from the filename, leading to code execution as when performing the shell expansion such characters will be interpreted as shell commands.\n\nTo exploit this vulnerability the targeted system should run the glob CLI over a file with a maliciously crafted filename, additionally the attacker needs to have enough permission to create such file or trick the user to download and process the required file with the glob CLI.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64756"
},
{
"category": "external",
"summary": "RHBZ#2415451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2415451"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146",
"url": "https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2",
"url": "https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2"
}
],
"release_date": "2025-11-17T17:29:08.029000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using the `glob` command-line interface with the `-c` or `--cmd` option when processing filenames from untrusted sources. If programmatic use of `glob` is necessary, ensure that filenames are thoroughly sanitized before being passed to commands executed with shell interpretation enabled.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "glob: glob: Command Injection Vulnerability via Malicious Filenames"
},
{
"cve": "CVE-2025-65945",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2025-12-04T19:01:14.733682+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418904"
}
],
"notes": [
{
"category": "description",
"text": "auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "RHBZ#2418904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e",
"url": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x",
"url": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x"
}
],
"release_date": "2025-12-04T18:45:37.517000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm"
},
{
"cve": "CVE-2025-66031",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-11-26T23:01:36.363253+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417397"
}
],
"notes": [
{
"category": "description",
"text": "Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge ASN.1 Unbounded Recursion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "RHBZ#2417397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451",
"url": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27"
}
],
"release_date": "2025-11-26T22:23:26.013000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "node-forge: node-forge ASN.1 Unbounded Recursion"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-66490",
"cwe": {
"id": "CWE-436",
"name": "Interpretation Conflict"
},
"discovery_date": "2025-12-09T01:06:39.573043+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2420301"
}
],
"notes": [
{
"category": "description",
"text": "Traefik is an HTTP reverse proxy and load balancer. For versions prior to 2.11.32 and 2.11.31 through 3.6.2, requests using PathPrefix, Path or PathRegex matchers can bypass path normalization. When Traefik uses path-based routing, requests containing URL-encoded restricted characters (/, \\, Null, ;, ?, #) can bypass the middleware chain and reach unintended backends. For example, a request to http://mydomain.example.com/admin%2F could reach service-a without triggering my-security-middleware, bypassing security controls for the /admin/ path. This issue is fixed in versions 2.11.32 and 3.6.3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/traefik/traefik: Traefik Path Normalization Bypass in Router + Middleware Rules",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66490"
},
{
"category": "external",
"summary": "RHBZ#2420301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420301"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66490"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/releases/tag/v2.11.32",
"url": "https://github.com/traefik/traefik/releases/tag/v2.11.32"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/releases/tag/v3.6.4",
"url": "https://github.com/traefik/traefik/releases/tag/v3.6.4"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/security/advisories/GHSA-gm3x-23wp-hc2c",
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-gm3x-23wp-hc2c"
}
],
"release_date": "2025-12-09T00:35:26.530000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/traefik/traefik: Traefik Path Normalization Bypass in Router + Middleware Rules"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-22029",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-01-10T04:01:03.694749+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428412"
}
],
"notes": [
{
"category": "description",
"text": "React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs causing unintended javascript execution on the client. This is only an issue if you are creating redirect paths from untrusted content or via an open redirect. There is no impact if Declarative Mode (\u003cBrowserRouter\u003e) is being used. This issue has been patched in @remix-run/router version 1.23.2 and react-router version 7.12.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "RHBZ#2428412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22029",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22029"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx",
"url": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx"
}
],
"release_date": "2026-01-10T02:42:32.736000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T17:06:01+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2456"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:60a1c1cf2a755e24203ae76e37c3e1c08f97ae8a1905df3538b31f7d9b543f0f_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:772af8d40b674ce306850d3ecf2b70b39bdceaf9e045a2db9299c0dd8bd5e6b5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a85afca6643f11c1e0d3976d5e679cea06d85675a5859e7e08611139f2450520_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:aa1d96a9c1d9dbf2fe077748807de1e047a17a942a87688c269aa60537b5c6d4_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:51c627941a630d042202df9fbb0be4c289c3c2b4047092d350f564ea9815c55e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:c4339b180ab8f5fc5ea656c6d604ad1342e329557be4fe83f7747e7b30327908_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e2c1df1a1bc028158873b636f8b0341090b7f5211d74d0143c39b3b1f9d36472_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:eaf02961dff765751f8b0f14dbc928401faa0fa60c0ee0bf340ed814509794fc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:1a4accefcf3c48a44818e9126cdb893d469c93b2f058ce3cff6195d823d9e6c5_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:8608f41d9887eb5fea9df4b9c273fea3512c3ad492bbf8e542e6369db15be680_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:e0e7e2242127555100372896dee91fb69dd1a2fdbcce8473a1c343fc6b0b838d_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:f818d47a01fd77940943b79133d1c7bf053359c72832e0df61397847af43f6e7_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:65b57a43496e012535680c5f6758bf4e482f0496619c1502b50cb4852723088e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7705755155844d580db7d2ce942bb095545f465be7a091bc14598f5ae83c0301_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:998779815c5a7888b80f635b942a7409733a839f4c7253a7b5ff920129f987ea_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:ba7fc29722ef40b1565978c1f578786ccb65752bc82f50b794f3c5ab0c789d2a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:c72b135ccb51663313a9ed55dc5d46af1fbc2476c0243a523ce531262cb82acf_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:8935901859ad9b07689de3d9ea602adf21bcbd2105cedba83503296230b4adad_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b8ae475ea425efb5d30d2c23cd789ee993ee7e5026ed5c892106512351aee416_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:bc60ec1ad66c342f632d32a64012cae3c4426f54bf08578d60d25a68c31b02cd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:fd35a91b2542252bcd695cd7d02727e8a1c593f1c9a9ec88da92d5d797b17bc5_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0f87d0637586a8d1aedb84b266f9781af80f63c1342b3951559aa18343825993_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:2efc89cc392a8fdb0d2a493aa7cb0d5a6e3cc5efe19054181befe452f293ea59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:43368b4815eea7a9b1b6a33b061af43f521810efc1c102df0426796e431d0add_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:454566dfa4c035a67f5e4d5ed19289d1c97f2546ee06ef587aff36b3f2cdadee_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:4e83ac026653a09abe7f783844617502298f45d4f12cb46445ad8d27722eed42_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:55e7a74a6e435a77cbdeee2d8d333f830d47c52449a27770310f010c4c4c6dd1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:6a70faa18a51c05328cba689acd2cef1f248ba4d9f78802f3bdc4aff4183d521_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:819f3c80c8241446239d783d01e9a65e3448427a683dbaa5b91ba859329cdbd2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:5295d0aa61988b2722c9171a0c0f7a61e749479979746355861d0c8b6c2b58a8_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:65d7c3ada0b4c4fdfb576f5fbbc8b75264c26a4baabdbbaf2197e05186b6bdd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:be63fdd87b11d550dbd8cef2b74cbf843ed778365d877684e8525c9b017f3a50_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:c06a36be7e7392da6fcdbdbf79bf704852be05ac7bc094cc63355180b05ed9ba_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:024f64869d4813d8b0938f8cad9a0bf4e4e924a5082ac2ee3ea0bc6ba51edfe5_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b709ca92a102d77f8a090e1503877e12dc24bbd6e91c0205d8402ad3a9c365e9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:de30783c5550d7dc3ebd71507ce41e4a6f6209663299453aaf35b73f17d161d8_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:ffe5740d684ac4a1b6c440bb4d2ca3ec20d71c008e65fa73f5143c43a7bda339_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:4c5121d8f31d840f55e575bf266f2ca179a81f05dd49fbd63a4ee7e3f8a97001_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:870546a61219ce727b59586e31edb8cbc653ce72264b23a89a916d04a0627fe0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:bc68ad64665acf9c4807bb4f4ae920da7c2a82716c8bc151bd269a4f234fc69e_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:fd2925764c63cf6ee7cb92dab59cc8f6f696f628e4676b37297dab95aa0187f1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:1a1e372643b7eeabd4acda8b440173ef83087b453a89f554b4c1c006c7a796c8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:377caaaff59c843357600332c63278fa019eacec2a60567725dd149e98d6d3fb_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:4983729652072e885f84298af878c72f757bfb1e820dbb9ee4ad2494a6bd0f48_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:60460d63a971f7f129f97f1d73f8f577565d82a5f8d476e19b249b6e543dee0b_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:0f0dbdab221c9ea50603b8a48ed61b2e322dc4dc03028611bcb120ea7bc32a81_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:3f001b01ff331475bc37556515ecab11699f54560d33caa8f45e84cb8ff91410_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8d7f9a00fd74530f30b15e62db3d3c7096a04a6e68e28ca1ba04eae538034f93_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:e8da554ed086a4ac5fcbe6ad7797f1f36c965aae3bbb75c2fd446b9dfa1d5592_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:7335ec3e28a4f9e88f03df6ad4b245f6ffc3e0b79aa1c5072f5cf27bbd0dbb17_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:a05ebcc4507fd1c7d47254f6dc9b94a7fd1c0868f17e51cfe6e310f763e9baba_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:b4770ac4b68c340a5efa523751761b725ddfb38d25cf129e2a978f6e3774e7c2_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel10@sha256:cc2df284c22698278472a3cb0b748b797097bacf72e24a13f98c8cd9643452d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:10da53d4e0216c034f57c990d1569c25558f68e65b7fc07e18b3e6be89490162_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:276782b304e7f31d1e846f6acc5caeda45055adb8630d1605ad4ec55431ef6ec_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b998742f17f56c16942062d11d4f7f62181703f4be20db6fa807a35d016cd7da_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-base-rhel9@sha256:cc54713d9a3f0a44403d9c8d13ae1f9179e2af96b144366b6ae7e753dab4ce70_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:2966ebf5a1744c8bebae6c03efc4685aa8db9de84138fe95a63ad721a42ae06a_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:b520d66efc293127d9f0478eff66e2ddc6830f3b7d6ced0abe931792022a3f70_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:da6e70b4d7cf45da59e36c7741f532d9bfed498a00082560a34491419016c437_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f592ddd74feb260b51087e6555b6e7e42e61dc12a87475e3aa3b7729e33fcf93_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects"
}
]
}
RHSA-2026:1017
Vulnerability from csaf_redhat - Published: 2026-01-22 15:47 - Updated: 2026-02-11 13:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Important: Red Hat OpenShift GitOps v1.18.3 security update",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat OpenShift GitOps.\nBug Fix(es) and Enhancement(s):\n* GITOPS-8239 (CVE-2025-47913 openshift-gitops-1/gitops-rhel8: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS [gitops-1.18])\n* GITOPS-8079 (CVE-2025-58183 openshift-gitops-1/argocd-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.18])\n* GITOPS-8082 (CVE-2025-58183 openshift-gitops-1/dex-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.18])\n* GITOPS-8522 (CVE-2025-68156 openshift-gitops-1/argocd-rhel8: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.18])\n* GITOPS-8523 (CVE-2025-68156 openshift-gitops-1/argocd-rhel9: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.18])\n* GITOPS-7849 (Cherry pick Repo Type Fix to Argo CD 3.1 stream)\n* GITOPS-7992 (openshift-gitops-operator-metrics-monitor ServiceMonitor is attempting to use a bearerTokenFile configuration in its endpoints definition)\n* GITOPS-8225 (RC 1.19.0-2 : haproxy replica remains 1 with HA upgrade)\n* GITOPS-8249 (Prevent argoCD from automatically refreshing to gitops repository )\n* GITOPS-8411 (CVE-2025-55190 still blocking due to github.com/argoproj/argo-cd/v2@v2.14.11 in gitops-rhel8:v1.18.1)\n* GITOPS-8535 (Show All Namespaces or Current Namespace Only option)\n* GITOPS-8591 (Reciving TargetDown after upgrading GitOps )",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1017",
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13888",
"url": "https://access.redhat.com/security/cve/CVE-2025-13888"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-55190",
"url": "https://access.redhat.com/security/cve/CVE-2025-55190"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68156",
"url": "https://access.redhat.com/security/cve/CVE-2025-68156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.18/",
"url": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.18/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1017.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.3 security update",
"tracking": {
"current_release_date": "2026-02-11T13:00:42+00:00",
"generator": {
"date": "2026-02-11T13:00:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1017",
"initial_release_date": "2026-01-22T15:47:03+00:00",
"revision_history": [
{
"date": "2026-01-22T15:47:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-23T04:51:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T13:00:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift GitOps 1.18",
"product": {
"name": "Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_gitops:1.18::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift GitOps"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Addc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881232"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880997"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881228"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Aae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Aed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882258"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881034"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881033"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-operator-bundle@sha256%3Aa4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768883693"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880947"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Ad529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881232"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880997"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881228"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Aa0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882258"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881034"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881033"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880947"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Af87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3Af8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881232"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Aa621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880997"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881228"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Ab6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Aab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882258"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881034"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881033"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880947"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3Aa333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881232"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Aa6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880997"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881228"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Abca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882258"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881034"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Ae73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881033"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Ade7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880947"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13888",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2025-12-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418361"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenShift GitOps. Namespace admins can create ArgoCD Custom Resources (CRs) that trick the system into granting them elevated permissions in other namespaces, including privileged namespaces. An authenticated attacker can then use these elevated permissions to create privileged workloads that run on master nodes, effectively giving them root access to the entire cluster.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openshift-gitops-operator: OpenShift GitOps: Namespace Admin Cluster Takeover via Privileged Jobs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this vulnerability as Important instead of Critical. While full cluster compromise is possible, it requires the attacker to already possess authenticated namespace administrator credentials, reducing the attack surface to authorized internal users rather than external attackers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13888"
},
{
"category": "external",
"summary": "RHBZ#2418361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418361"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13888"
},
{
"category": "external",
"summary": "https://github.com/redhat-developer/gitops-operator/commit/bc6ac3e03d7c8b3db5d8f1770c868396a4c2dcef",
"url": "https://github.com/redhat-developer/gitops-operator/commit/bc6ac3e03d7c8b3db5d8f1770c868396a4c2dcef"
},
{
"category": "external",
"summary": "https://github.com/redhat-developer/gitops-operator/pull/897",
"url": "https://github.com/redhat-developer/gitops-operator/pull/897"
},
{
"category": "external",
"summary": "https://github.com/redhat-developer/gitops-operator/releases/tag/v1.16.2",
"url": "https://github.com/redhat-developer/gitops-operator/releases/tag/v1.16.2"
}
],
"release_date": "2025-12-15T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openshift-gitops-operator: OpenShift GitOps: Namespace Admin Cluster Takeover via Privileged Jobs"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-55190",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-08-21T07:09:49.658000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2390026"
}
],
"notes": [
{
"category": "description",
"text": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. In versions 2.13.0 through 2.13.8, 2.14.0 through 2.14.15, 3.0.0 through 3.0.12 and 3.1.0-rc1 through 3.1.1, API tokens with project-level permissions are able to retrieve sensitive repository credentials (usernames, passwords) through the project details API endpoint, even when the token only has standard application management permissions and no explicit access to secrets. This vulnerability does not only affect project-level permissions. Any token with project get permissions is also vulnerable, including global permissions such as: `p, role/user, projects, get, *, allow`. This issue is fixed in versions 2.13.9, 2.14.16, 3.0.14 and 3.1.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/argoproj/argo-cd: Project API Token Exposes Repository Credentials",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has Important impact as exploitation requires some privileges granted by the system. An attacker would either need the ability to create an API token (via having valid login credentials) or to have stolen an API token from a legitimate user. It does not grant full control over the system, attackers can only tamper with the project(s) associated with an API token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55190"
},
{
"category": "external",
"summary": "RHBZ#2390026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2390026"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55190"
},
{
"category": "external",
"summary": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-786q-9hcg-v9ff",
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-786q-9hcg-v9ff"
}
],
"release_date": "2025-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/argoproj/argo-cd: Project API Token Exposes Repository Credentials"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68156",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-16T19:01:42.049157+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2422891"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Expr, an expression language and expression evaluation for Go. This vulnerability allows a denial of service (DoS) via recursive traversal over user-provided deeply nested or cyclic data structures without enforcing a maximum recursion depth, leading to a stack overflow panic and application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products utilizing the `Expr` Go library because it can lead to a denial-of-service. Exploitation requires an application to evaluate expressions against untrusted or insufficiently validated data structures containing deeply nested or cyclic references, which can cause a stack overflow and application crash. Products that do not process untrusted input with `Expr` are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68156"
},
{
"category": "external",
"summary": "RHBZ#2422891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2422891"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68156"
},
{
"category": "external",
"summary": "https://github.com/expr-lang/expr/pull/870",
"url": "https://github.com/expr-lang/expr/pull/870"
},
{
"category": "external",
"summary": "https://github.com/expr-lang/expr/security/advisories/GHSA-cfpf-hrx2-8rv6",
"url": "https://github.com/expr-lang/expr/security/advisories/GHSA-cfpf-hrx2-8rv6"
}
],
"release_date": "2025-12-16T18:24:11.648000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications using the `Expr` library should ensure that evaluation environments do not contain cyclic references. Additionally, externally supplied data structures must be validated or sanitized before being passed to `Expr` for evaluation. As a last-resort defensive measure, expression evaluation can be wrapped with panic recovery to prevent a full process crash.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation"
}
]
}
RHSA-2026:2371
Vulnerability from csaf_redhat - Published: 2026-02-09 20:49 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Web Terminal Operator 1.12.1 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "The Web Terminal provides a way to access a fully in-browser terminal emulator within the OpenShift Console. Command-line tools for interacting with the OpenShift cluster are pre-installed.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2371",
"url": "https://access.redhat.com/errata/RHSA-2026:2371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2371.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Web Terminal Operator 1.12.1 release.",
"tracking": {
"current_release_date": "2026-02-11T08:53:19+00:00",
"generator": {
"date": "2026-02-11T08:53:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2371",
"initial_release_date": "2026-02-09T20:49:08+00:00",
"revision_history": [
{
"date": "2026-02-09T20:49:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T20:49:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Web Terminal 1.12",
"product": {
"name": "Red Hat Web Terminal 1.12",
"product_id": "Red Hat Web Terminal 1.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:webterminal:1.12::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Web Terminal"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-exec-rhel9@sha256%3A47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770667927"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-rhel9-operator@sha256%3A9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770667927"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-operator-bundle@sha256%3Aa16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770667885"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-tooling-rhel9@sha256%3A335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770667946"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64 as a component of Red Hat Web Terminal 1.12",
"product_id": "Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64 as a component of Red Hat Web Terminal 1.12",
"product_id": "Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64 as a component of Red Hat Web Terminal 1.12",
"product_id": "Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64 as a component of Red Hat Web Terminal 1.12",
"product_id": "Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T20:49:08+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.17 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2371"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1042
Vulnerability from csaf_redhat - Published: 2026-01-22 18:14 - Updated: 2026-02-11 13:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cert-manager Operator for Red Hat OpenShift 1.18.1",
"title": "Topic"
},
{
"category": "general",
"text": "The cert-manager Operator for Red Hat OpenShift builds on top of Kubernetes, introducing certificate authorities\nand certificates as first-class resource types in the Kubernetes API. This makes it possible to provide\ncertificates-as-a-service to developers working within your Kubernetes cluster.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1042",
"url": "https://access.redhat.com/errata/RHSA-2026:1042"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61727",
"url": "https://access.redhat.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html",
"url": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1042.json"
}
],
"title": "Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1",
"tracking": {
"current_release_date": "2026-02-11T13:00:46+00:00",
"generator": {
"date": "2026-02-11T13:00:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1042",
"initial_release_date": "2026-01-22T18:14:00+00:00",
"revision_history": [
{
"date": "2026-01-22T18:14:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-22T18:14:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T13:00:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product": {
"name": "cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cert_manager:1.18::el9"
}
}
}
],
"category": "product_family",
"name": "cert-manager operator for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3Ac8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2?arch=amd64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769093421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc?arch=amd64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769104096"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3Abf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0?arch=s390x\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769093421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28?arch=s390x\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769104096"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3A77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067?arch=ppc64le\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769093421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4?arch=ppc64le\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769104096"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3A9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf?arch=arm64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769093421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95?arch=arm64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=1769104096"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64 as a component of cert-manager operator for Red Hat OpenShift 1.18",
"product_id": "cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-12-03T20:01:21.730501+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418677"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/x509 package in the Go standard library. This vulnerability allows a certificate validation bypass via an excluded subdomain constraint in a certificated chain as it does not restrict the usage of wildcard SANs in the leaf certificate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to obtain a leaf certificate with a wildcard SAN (e.g., *.example.com) and the legitimate certificate policy must contain an excluded DNS name constraint (e.g., to prevent issuance for test.example.com), allowing an application using the crypto/x509 package to validate the certificate when it should have been rejected and to be vulnerable to MITM (man-in-the-middle) attacks. Additionally, the attacker does not have full control of what data can be read of modified during the attack. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "RHBZ#2418677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"category": "external",
"summary": "https://go.dev/cl/723900",
"url": "https://go.dev/cl/723900"
},
{
"category": "external",
"summary": "https://go.dev/issue/76442",
"url": "https://go.dev/issue/76442"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4175",
"url": "https://pkg.go.dev/vuln/GO-2025-4175"
}
],
"release_date": "2025-12-03T19:37:15.054000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T18:14:00+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1042"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T18:14:00+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T18:14:00+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T18:14:00+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1042"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T18:14:00+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1042"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:08b6b8c954c1a7ceb5a446eb1bc3e28c434cc576b77cd369c85ea79775dfb1cc_amd64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2f2e78fd6d5a22d977e80100425da58d77a5286d4d017c38e27d7900d52fdb28_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:749ce9e6e1216fc8e8e29c01ff14b11a1290de1bec9bd4d692f5cbace03f8e95_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:7906836c624e2aea656d2c64bd3fee260b69c9f6a0ab46e5d228154f5d6241c4_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:77f4d70980abe59f1e69bf38bfeeeed0b84b27fe9ae3286666d01a0c8aa6b067_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:9f89f2a9de21e45f472d533a7b627c7f27fdf726efef24ff972cebfd30815cbf_arm64",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:bf234df32160c906c15cc437b66a7b35a913a400f921f2cd2e44c83a02d9c7b0_s390x",
"cert-manager operator for Red Hat OpenShift 1.18:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:c8c319818479dfb5856d50ccebe1c6aaad008aff2b1ac5c317763a697884b2c2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
}
]
}
RHSA-2026:2374
Vulnerability from csaf_redhat - Published: 2026-02-09 21:56 - Updated: 2026-02-11 08:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Web Terminal Operator 1.13.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "The Web Terminal provides a way to access a fully in-browser terminal emulator within the OpenShift Console. Command-line tools for interacting with the OpenShift cluster are pre-installed.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2374",
"url": "https://access.redhat.com/errata/RHSA-2026:2374"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2374.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Web Terminal Operator 1.13.0 release.",
"tracking": {
"current_release_date": "2026-02-11T08:53:19+00:00",
"generator": {
"date": "2026-02-11T08:53:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2374",
"initial_release_date": "2026-02-09T21:56:53+00:00",
"revision_history": [
{
"date": "2026-02-09T21:56:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T21:57:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-11T08:53:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Web Terminal 1.13",
"product": {
"name": "Red Hat Web Terminal 1.13",
"product_id": "Red Hat Web Terminal 1.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:webterminal:1.13::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Web Terminal"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:6f78170f41610859d522324bffe3590d991c0e02ce44da9968d540a8db7c1bfd_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:6f78170f41610859d522324bffe3590d991c0e02ce44da9968d540a8db7c1bfd_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:6f78170f41610859d522324bffe3590d991c0e02ce44da9968d540a8db7c1bfd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-exec-rhel9@sha256%3A6f78170f41610859d522324bffe3590d991c0e02ce44da9968d540a8db7c1bfd?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770668471"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:aa94bed77f40f0bf99aa71d95439aefcd8dce9ad01fa35e5013f67227fc8cc99_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:aa94bed77f40f0bf99aa71d95439aefcd8dce9ad01fa35e5013f67227fc8cc99_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:aa94bed77f40f0bf99aa71d95439aefcd8dce9ad01fa35e5013f67227fc8cc99_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-rhel9-operator@sha256%3Aaa94bed77f40f0bf99aa71d95439aefcd8dce9ad01fa35e5013f67227fc8cc99?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770668469"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:cd8dec02fe8a1bfa3a1f6879223f4ba753edd6176f371bf9b250fcda3ffd970e_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:cd8dec02fe8a1bfa3a1f6879223f4ba753edd6176f371bf9b250fcda3ffd970e_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:cd8dec02fe8a1bfa3a1f6879223f4ba753edd6176f371bf9b250fcda3ffd970e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-operator-bundle@sha256%3Acd8dec02fe8a1bfa3a1f6879223f4ba753edd6176f371bf9b250fcda3ffd970e?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770668437"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4cb5aff0dc2b231fca2b9b47458ca01a191f824c58241fa25a548825d9c9e53b_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4cb5aff0dc2b231fca2b9b47458ca01a191f824c58241fa25a548825d9c9e53b_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4cb5aff0dc2b231fca2b9b47458ca01a191f824c58241fa25a548825d9c9e53b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-tooling-rhel9@sha256%3A4cb5aff0dc2b231fca2b9b47458ca01a191f824c58241fa25a548825d9c9e53b?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770668520"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:6f78170f41610859d522324bffe3590d991c0e02ce44da9968d540a8db7c1bfd_amd64 as a component of Red Hat Web Terminal 1.13",
"product_id": "Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:6f78170f41610859d522324bffe3590d991c0e02ce44da9968d540a8db7c1bfd_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:6f78170f41610859d522324bffe3590d991c0e02ce44da9968d540a8db7c1bfd_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:cd8dec02fe8a1bfa3a1f6879223f4ba753edd6176f371bf9b250fcda3ffd970e_amd64 as a component of Red Hat Web Terminal 1.13",
"product_id": "Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:cd8dec02fe8a1bfa3a1f6879223f4ba753edd6176f371bf9b250fcda3ffd970e_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:cd8dec02fe8a1bfa3a1f6879223f4ba753edd6176f371bf9b250fcda3ffd970e_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:aa94bed77f40f0bf99aa71d95439aefcd8dce9ad01fa35e5013f67227fc8cc99_amd64 as a component of Red Hat Web Terminal 1.13",
"product_id": "Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:aa94bed77f40f0bf99aa71d95439aefcd8dce9ad01fa35e5013f67227fc8cc99_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:aa94bed77f40f0bf99aa71d95439aefcd8dce9ad01fa35e5013f67227fc8cc99_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4cb5aff0dc2b231fca2b9b47458ca01a191f824c58241fa25a548825d9c9e53b_amd64 as a component of Red Hat Web Terminal 1.13",
"product_id": "Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4cb5aff0dc2b231fca2b9b47458ca01a191f824c58241fa25a548825d9c9e53b_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4cb5aff0dc2b231fca2b9b47458ca01a191f824c58241fa25a548825d9c9e53b_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:cd8dec02fe8a1bfa3a1f6879223f4ba753edd6176f371bf9b250fcda3ffd970e_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:aa94bed77f40f0bf99aa71d95439aefcd8dce9ad01fa35e5013f67227fc8cc99_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4cb5aff0dc2b231fca2b9b47458ca01a191f824c58241fa25a548825d9c9e53b_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:6f78170f41610859d522324bffe3590d991c0e02ce44da9968d540a8db7c1bfd_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:cd8dec02fe8a1bfa3a1f6879223f4ba753edd6176f371bf9b250fcda3ffd970e_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:aa94bed77f40f0bf99aa71d95439aefcd8dce9ad01fa35e5013f67227fc8cc99_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4cb5aff0dc2b231fca2b9b47458ca01a191f824c58241fa25a548825d9c9e53b_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T21:56:53+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.18 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:6f78170f41610859d522324bffe3590d991c0e02ce44da9968d540a8db7c1bfd_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2374"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:6f78170f41610859d522324bffe3590d991c0e02ce44da9968d540a8db7c1bfd_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:cd8dec02fe8a1bfa3a1f6879223f4ba753edd6176f371bf9b250fcda3ffd970e_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:aa94bed77f40f0bf99aa71d95439aefcd8dce9ad01fa35e5013f67227fc8cc99_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4cb5aff0dc2b231fca2b9b47458ca01a191f824c58241fa25a548825d9c9e53b_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
CERTFR-2025-AVI-1138
Vulnerability from certfr_avis - Published: 2025-12-26 - Updated: 2025-12-26
De multiples vulnérabilités ont été découvertes dans VMware Tanzu Platform. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | AI Services pour Tanzu Platform versions antérieures à 10.3.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "AI Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-62727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-62164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62164"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-66448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66448"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-34351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34351"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2023-48022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48022"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-62593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62593"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
}
],
"initial_release_date": "2025-12-26T00:00:00",
"last_revision_date": "2025-12-26T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1138",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu Platform. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu Platform",
"vendor_advisories": [
{
"published_at": "2025-12-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36640",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36640"
}
]
}
CERTFR-2025-AVI-1138
Vulnerability from certfr_avis - Published: 2025-12-26 - Updated: 2025-12-26
De multiples vulnérabilités ont été découvertes dans VMware Tanzu Platform. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | AI Services pour Tanzu Platform versions antérieures à 10.3.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "AI Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-62727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-62164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62164"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-66448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66448"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-34351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34351"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2023-48022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48022"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-62593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62593"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
}
],
"initial_release_date": "2025-12-26T00:00:00",
"last_revision_date": "2025-12-26T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1138",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu Platform. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu Platform",
"vendor_advisories": [
{
"published_at": "2025-12-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36640",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36640"
}
]
}
CERTFR-2025-AVI-1078
Vulnerability from certfr_avis - Published: 2025-12-08 - Updated: 2025-12-08
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 msft-golang 1.24.9-1 | ||
| Microsoft | N/A | cbl2 golang 1.22.7-5 | ||
| Microsoft | N/A | azl3 golang 1.23.12-1 | ||
| Microsoft | N/A | cbl2 python3 3.9.19-16 | ||
| Microsoft | N/A | cbl2 python-tensorboard 2.11.0-3 | ||
| Microsoft | N/A | cbl2 qt5-qtbase 5.12.11-18 | ||
| Microsoft | N/A | cbl2 reaper 3.1.1-21 | ||
| Microsoft | N/A | cbl2 python3 3.9.19-17 | ||
| Microsoft | N/A | azl3 python-tensorboard 2.16.2-6 | ||
| Microsoft | N/A | azl3 kernel 6.6.112.1-2 | ||
| Microsoft | N/A | cbl2 vim 9.1.1616-1 | ||
| Microsoft | N/A | cbl2 kernel 5.15.186.1-1 | ||
| Microsoft | N/A | azl3 tensorflow 2.16.1-9 | ||
| Microsoft | N/A | cbl2 gcc 11.2.0-8 | ||
| Microsoft | N/A | azl3 vim 9.1.1616-1 | ||
| Microsoft | N/A | azl3 golang 1.25.3-1 | ||
| Microsoft | N/A | azl3 pgbouncer 1.24.1-1 | ||
| Microsoft | N/A | cbl2 tensorflow 2.11.1-2 | ||
| Microsoft | N/A | azl3 libpng 1.6.40-1 versions antérieures à 1.6.52-1 | ||
| Microsoft | N/A | azl3 gcc 13.2.0-7 | ||
| Microsoft | N/A | azl3 python3 3.12.9-5 | ||
| Microsoft | N/A | cbl2 golang 1.18.8-10 | ||
| Microsoft | N/A | cbl2 reaper 3.1.1-19 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 msft-golang 1.24.9-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 golang 1.22.7-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.23.12-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python3 3.9.19-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 qt5-qtbase 5.12.11-18",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 reaper 3.1.1-21",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python3 3.9.19-17",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.112.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 vim 9.1.1616-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kernel 5.15.186.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 gcc 11.2.0-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 vim 9.1.1616-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.25.3-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 pgbouncer 1.24.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 tensorflow 2.11.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libpng 1.6.40-1 versions ant\u00e9rieures \u00e0 1.6.52-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 gcc 13.2.0-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python3 3.12.9-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 golang 1.18.8-10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 reaper 3.1.1-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-66476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66476"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2025-12385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12385"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2025-12819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12819"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-34297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34297"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
}
],
"initial_release_date": "2025-12-08T00:00:00",
"last_revision_date": "2025-12-08T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1078",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40254",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40254"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40257",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40257"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40245",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40245"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40258",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40258"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50304",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50304"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40219",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40219"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40233",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40233"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40244",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40244"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53209",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53209"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61729"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40262",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40262"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40253",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40253"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40223",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40223"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40217",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40217"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-6485",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6485"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40252",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40252"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40250",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40250"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40261",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40261"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40215",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40215"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40264",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40264"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40263",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40263"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12084",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12084"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12385",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12385"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12819",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12819"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61727"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40242",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40242"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40259",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40259"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50303",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50303"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40243",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40243"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40251",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40251"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40247",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40247"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40220",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40220"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66476",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66476"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40240",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40240"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40248",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40248"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13836",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13836"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66293",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66293"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53231",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53231"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40218",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40218"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13837",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13837"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40266",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40266"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-34297",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-34297"
}
]
}
CERTFR-2026-AVI-0112
Vulnerability from certfr_avis - Published: 2026-02-02 - Updated: 2026-02-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.1.7 | ||
| VMware | Tanzu Kubernetes Grid Integrated Edition | Tanzu Kubernetes Grid Integrated Edition (TKGi) - Mgmt Console versions antérieures à 1.24.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.7+LTS-T | ||
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.74 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.2.3 | ||
| VMware | Tanzu Platform | Telemetry pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | N/A | Platform Automation Toolkit versions antérieures à 5.4.0 | ||
| VMware | N/A | VMware Harbor Registry versions antérieures à 2.14.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.4 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.7",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Kubernetes Grid Integrated Edition (TKGi) - Mgmt Console versions ant\u00e9rieures \u00e0 1.24.0",
"product": {
"name": "Tanzu Kubernetes Grid Integrated Edition",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.7+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.74",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.3",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Harbor Registry versions ant\u00e9rieures \u00e0 2.14.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2026-24882",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24882"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2022-49390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49390"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-14762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14762"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2026-24883",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24883"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-6966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6966"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2024-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53218"
},
{
"name": "CVE-2025-67499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67499"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-11413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11413"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2024-53090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53090"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-23419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23419"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2024-50067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
},
{
"name": "CVE-2024-47220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47220"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2026-24881",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24881"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-47691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47691"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
}
],
"initial_release_date": "2026-02-02T00:00:00",
"last_revision_date": "2026-02-02T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0112",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36902",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36902"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36908",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36908"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36897",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36897"
},
{
"published_at": "2026-02-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36912",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36912"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36904",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36904"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36900",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36900"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36903",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36903"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36909",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36909"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36899",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36899"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36906",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36906"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36907",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36907"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36901",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36901"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36905",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36905"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36898",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36898"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36910",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36910"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36911",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36911"
}
]
}
CERTFR-2025-AVI-1129
Vulnerability from certfr_avis - Published: 2025-12-19 - Updated: 2025-12-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Extended App Support pour Tanzu Platform versions antérieures à 1.0.11 | ||
| VMware | Tanzu Platform | Cloud Native Buildpacks pour Tanzu Platform versions antérieures à 0.6.1 | ||
| VMware | Tanzu Platform | Elastic Application Runtime pour Tanzu Platform versions antérieures à 10.3.2 | ||
| VMware | Tanzu Platform | Elastic Application Runtime pour Tanzu Platform versions antérieures à 10.2.6+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | .NET Core Buildpack versions antérieures à 2.4.72 | ||
| VMware | Tanzu Platform | Elastic Application Runtime pour Tanzu Platform versions antérieures à 6.0.23+LTS-T |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.11",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Native Buildpacks pour Tanzu Platform versions ant\u00e9rieures \u00e0 0.6.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.6+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": ".NET Core Buildpack versions ant\u00e9rieures \u00e0 2.4.72",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.23+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3573"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-64329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64329"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-27111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27111"
},
{
"name": "CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2024-3044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3044"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2020-7792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7792"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-66030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66030"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-12905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12905"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25184"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2024-25621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25621"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-12194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12194"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2025-57352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57352"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
}
],
"initial_release_date": "2025-12-19T00:00:00",
"last_revision_date": "2025-12-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1129",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-25",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36626"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36633",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36633"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36630",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36630"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36631",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36631"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-26",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36629"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36632",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36632"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-25",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36627"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-26",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36628"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36625",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36625"
}
]
}
CERTFR-2025-AVI-1129
Vulnerability from certfr_avis - Published: 2025-12-19 - Updated: 2025-12-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Extended App Support pour Tanzu Platform versions antérieures à 1.0.11 | ||
| VMware | Tanzu Platform | Cloud Native Buildpacks pour Tanzu Platform versions antérieures à 0.6.1 | ||
| VMware | Tanzu Platform | Elastic Application Runtime pour Tanzu Platform versions antérieures à 10.3.2 | ||
| VMware | Tanzu Platform | Elastic Application Runtime pour Tanzu Platform versions antérieures à 10.2.6+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | .NET Core Buildpack versions antérieures à 2.4.72 | ||
| VMware | Tanzu Platform | Elastic Application Runtime pour Tanzu Platform versions antérieures à 6.0.23+LTS-T |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.11",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Native Buildpacks pour Tanzu Platform versions ant\u00e9rieures \u00e0 0.6.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.6+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": ".NET Core Buildpack versions ant\u00e9rieures \u00e0 2.4.72",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.23+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3573"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-64329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64329"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-27111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27111"
},
{
"name": "CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2024-3044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3044"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2020-7792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7792"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-66030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66030"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-12905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12905"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25184"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2024-25621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25621"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-12194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12194"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2025-57352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57352"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
}
],
"initial_release_date": "2025-12-19T00:00:00",
"last_revision_date": "2025-12-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1129",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-25",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36626"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36633",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36633"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36630",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36630"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36631",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36631"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-26",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36629"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36632",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36632"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-25",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36627"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-26",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36628"
},
{
"published_at": "2025-12-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36625",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36625"
}
]
}
CERTFR-2025-AVI-1078
Vulnerability from certfr_avis - Published: 2025-12-08 - Updated: 2025-12-08
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 msft-golang 1.24.9-1 | ||
| Microsoft | N/A | cbl2 golang 1.22.7-5 | ||
| Microsoft | N/A | azl3 golang 1.23.12-1 | ||
| Microsoft | N/A | cbl2 python3 3.9.19-16 | ||
| Microsoft | N/A | cbl2 python-tensorboard 2.11.0-3 | ||
| Microsoft | N/A | cbl2 qt5-qtbase 5.12.11-18 | ||
| Microsoft | N/A | cbl2 reaper 3.1.1-21 | ||
| Microsoft | N/A | cbl2 python3 3.9.19-17 | ||
| Microsoft | N/A | azl3 python-tensorboard 2.16.2-6 | ||
| Microsoft | N/A | azl3 kernel 6.6.112.1-2 | ||
| Microsoft | N/A | cbl2 vim 9.1.1616-1 | ||
| Microsoft | N/A | cbl2 kernel 5.15.186.1-1 | ||
| Microsoft | N/A | azl3 tensorflow 2.16.1-9 | ||
| Microsoft | N/A | cbl2 gcc 11.2.0-8 | ||
| Microsoft | N/A | azl3 vim 9.1.1616-1 | ||
| Microsoft | N/A | azl3 golang 1.25.3-1 | ||
| Microsoft | N/A | azl3 pgbouncer 1.24.1-1 | ||
| Microsoft | N/A | cbl2 tensorflow 2.11.1-2 | ||
| Microsoft | N/A | azl3 libpng 1.6.40-1 versions antérieures à 1.6.52-1 | ||
| Microsoft | N/A | azl3 gcc 13.2.0-7 | ||
| Microsoft | N/A | azl3 python3 3.12.9-5 | ||
| Microsoft | N/A | cbl2 golang 1.18.8-10 | ||
| Microsoft | N/A | cbl2 reaper 3.1.1-19 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 msft-golang 1.24.9-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 golang 1.22.7-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.23.12-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python3 3.9.19-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 qt5-qtbase 5.12.11-18",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 reaper 3.1.1-21",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python3 3.9.19-17",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.112.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 vim 9.1.1616-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kernel 5.15.186.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 gcc 11.2.0-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 vim 9.1.1616-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.25.3-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 pgbouncer 1.24.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 tensorflow 2.11.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libpng 1.6.40-1 versions ant\u00e9rieures \u00e0 1.6.52-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 gcc 13.2.0-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python3 3.12.9-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 golang 1.18.8-10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 reaper 3.1.1-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-66476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66476"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2025-12385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12385"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2025-12819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12819"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-34297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34297"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
}
],
"initial_release_date": "2025-12-08T00:00:00",
"last_revision_date": "2025-12-08T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1078",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40254",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40254"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40257",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40257"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40245",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40245"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40258",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40258"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50304",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50304"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40219",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40219"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40233",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40233"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40244",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40244"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53209",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53209"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61729"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40262",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40262"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40253",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40253"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40223",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40223"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40217",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40217"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-6485",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6485"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40252",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40252"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40250",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40250"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40261",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40261"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40215",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40215"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40264",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40264"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40263",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40263"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12084",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12084"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12385",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12385"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12819",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12819"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61727"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40242",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40242"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40259",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40259"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50303",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50303"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40243",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40243"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40251",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40251"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40247",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40247"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40220",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40220"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66476",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66476"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40240",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40240"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40248",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40248"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13836",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13836"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66293",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66293"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53231",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53231"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40218",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40218"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13837",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13837"
},
{
"published_at": "2025-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40266",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40266"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-34297",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-34297"
}
]
}
MSRC_CVE-2025-61729
Vulnerability from csaf_microsoft - Published: 2025-12-02 00:00 - Updated: 2025-12-13 01:38Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61729 Excessive resource consumption when printing error string for host certificate validation in crypto/x509 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-61729.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Excessive resource consumption when printing error string for host certificate validation in crypto/x509",
"tracking": {
"current_release_date": "2025-12-13T01:38:50.000Z",
"generator": {
"date": "2025-12-13T08:20:19.798Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-61729",
"initial_release_date": "2025-12-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-12-05T01:01:55.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-12-06T14:41:10.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2025-12-07T01:40:29.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2025-12-09T01:37:35.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
},
{
"date": "2025-12-12T01:38:08.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Information published."
},
{
"date": "2025-12-13T01:38:50.000Z",
"legacy_version": "6",
"number": "6",
"summary": "Information published."
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 golang 1.25.5-1",
"product": {
"name": "azl3 golang 1.25.5-1",
"product_id": "1"
}
},
{
"category": "product_version_range",
"name": "cbl2 golang 1.18.8-10",
"product": {
"name": "cbl2 golang 1.18.8-10",
"product_id": "6"
}
},
{
"category": "product_version_range",
"name": "cbl2 golang 1.22.7-5",
"product": {
"name": "cbl2 golang 1.22.7-5",
"product_id": "7"
}
},
{
"category": "product_version_range",
"name": "azl3 golang 1.23.12-1",
"product": {
"name": "azl3 golang 1.23.12-1",
"product_id": "8"
}
},
{
"category": "product_version_range",
"name": "azl3 golang 1.25.3-1",
"product": {
"name": "azl3 golang 1.25.3-1",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "golang"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 gcc 11.2.0-8",
"product": {
"name": "cbl2 gcc 11.2.0-8",
"product_id": "12"
}
}
],
"category": "product_name",
"name": "gcc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 msft-golang 1.24.9-1",
"product": {
"name": "cbl2 msft-golang 1.24.9-1",
"product_id": "4"
}
},
{
"category": "product_version_range",
"name": "cbl2 msft-golang 1.24.11-1",
"product": {
"name": "cbl2 msft-golang 1.24.11-1",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "msft-golang"
},
{
"category": "product_name",
"name": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "cbl2 python-tensorboard 2.11.0-3",
"product_id": "9"
}
},
{
"category": "product_name",
"name": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "azl3 python-tensorboard 2.16.2-6",
"product_id": "10"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "azl3 tensorflow 2.16.1-9",
"product_id": "14"
}
},
{
"category": "product_name",
"name": "cbl2 gcc 11.2.0-9",
"product": {
"name": "cbl2 gcc 11.2.0-9",
"product_id": "2"
}
},
{
"category": "product_name",
"name": "azl3 gcc 13.2.0-7",
"product": {
"name": "azl3 gcc 13.2.0-7",
"product_id": "13"
}
},
{
"category": "product_name",
"name": "cbl2 tensorflow 2.11.1-2",
"product": {
"name": "cbl2 tensorflow 2.11.1-2",
"product_id": "11"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-tensorboard 2.11.0-3 as a component of CBL Mariner 2.0",
"product_id": "17086-9"
},
"product_reference": "9",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.16.2-6 as a component of Azure Linux 3.0",
"product_id": "17084-10"
},
"product_reference": "10",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17084-14"
},
"product_reference": "14",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 gcc 11.2.0-9 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.25.5-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 golang 1.18.8-10 as a component of CBL Mariner 2.0",
"product_id": "17086-6"
},
"product_reference": "6",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 golang 1.22.7-5 as a component of CBL Mariner 2.0",
"product_id": "17086-7"
},
"product_reference": "7",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.23.12-1 as a component of Azure Linux 3.0",
"product_id": "17084-8"
},
"product_reference": "8",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.25.3-1 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 gcc 11.2.0-8 as a component of CBL Mariner 2.0",
"product_id": "17086-12"
},
"product_reference": "12",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 gcc 13.2.0-7 as a component of Azure Linux 3.0",
"product_id": "17084-13"
},
"product_reference": "13",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 msft-golang 1.24.9-1 as a component of CBL Mariner 2.0",
"product_id": "17086-4"
},
"product_reference": "4",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 tensorflow 2.11.1-2 as a component of CBL Mariner 2.0",
"product_id": "17086-11"
},
"product_reference": "11",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 msft-golang 1.24.11-1 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17086-9",
"17084-10",
"17084-14",
"17086-2",
"17084-13",
"17086-11"
]
}
],
"notes": [
{
"category": "general",
"text": "Go",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17084-1",
"17086-6",
"17086-7",
"17084-8",
"17084-5",
"17086-12",
"17086-4",
"17086-3"
],
"known_not_affected": [
"17086-9",
"17084-10",
"17084-14",
"17086-2",
"17084-13",
"17086-11"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61729 Excessive resource consumption when printing error string for host certificate validation in crypto/x509 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-61729.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2025-12-05T01:01:55.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
},
{
"category": "none_available",
"date": "2025-12-05T01:01:55.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-6"
]
},
{
"category": "none_available",
"date": "2025-12-05T01:01:55.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-7"
]
},
{
"category": "none_available",
"date": "2025-12-05T01:01:55.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-8"
]
},
{
"category": "none_available",
"date": "2025-12-05T01:01:55.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-5"
]
},
{
"category": "none_available",
"date": "2025-12-05T01:01:55.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-12"
]
},
{
"category": "none_available",
"date": "2025-12-05T01:01:55.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-4"
]
},
{
"category": "none_available",
"date": "2025-12-05T01:01:55.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-3"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17084-1",
"17086-6",
"17086-7",
"17084-8",
"17084-5",
"17086-12",
"17086-4",
"17086-3"
]
}
],
"title": "Excessive resource consumption when printing error string for host certificate validation in crypto/x509"
}
]
}
SUSE-SU-2026:0296-1
Vulnerability from csaf_suse - Published: 2026-01-26 13:51 - Updated: 2026-01-26 13:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):\n\nSecurity fixes:\n\n - CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#74821 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-296,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-296,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-296",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0296-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0296-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260296-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0296-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24-openssl",
"tracking": {
"current_release_date": "2026-01-26T13:51:05Z",
"generator": {
"date": "2026-01-26T13:51:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0296-1",
"initial_release_date": "2026-01-26T13:51:05Z",
"revision_history": [
{
"date": "2026-01-26T13:51:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.i586",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.i586",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2025:21193-1
Vulnerability from csaf_suse - Published: 2025-12-12 07:45 - Updated: 2025-12-12 07:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.11.\n\nSecurity issues fixed:\n\n- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion\n (bsc#1251258).\n- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation\n (bsc#1254431).\n\n\nOther issues fixed and changes:\n\n- Version 1.24.11:\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364\n cores\n\n- Version 1.24.10:\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n\n- Version 1.24.9:\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n\n- Version 1.24.8:\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n\n- Version 1.24.7:\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#74821 cmd/go: \"get toolchain@latest\" should ignore release candidates\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n\n- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).\n- Package svgpan.js to fix issues with \"go tool pprof\" (bsc#1249985).\n- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-103",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_21193-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:21193-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202521193-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:21193-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2025-12-12T07:45:36Z",
"generator": {
"date": "2025-12-12T07:45:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:21193-1",
"initial_release_date": "2025-12-12T07:45:36Z",
"revision_history": [
{
"date": "2025-12-12T07:45:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.11-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.11-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.11-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.11-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-1.24.11-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.11-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.11-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.11-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
SUSE-SU-2026:0308-1
Vulnerability from csaf_suse - Published: 2026-01-28 08:38 - Updated: 2026-01-28 08:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):\n\nSecurity fixes:\n\n - CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#74821 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-308,SUSE-SLE-Module-Development-Tools-15-SP7-2026-308,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-308,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-308,openSUSE-SLE-15.6-2026-308",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0308-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0308-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0308-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24-openssl",
"tracking": {
"current_release_date": "2026-01-28T08:38:40Z",
"generator": {
"date": "2026-01-28T08:38:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0308-1",
"initial_release_date": "2026-01-28T08:38:40Z",
"revision_history": [
{
"date": "2026-01-28T08:38:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.i586",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.i586",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0297-1
Vulnerability from csaf_suse - Published: 2026-01-26 16:10 - Updated: 2026-01-26 16:10Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\nUpdate to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):\n\nSecurity fixes:\n\n - CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).\n - CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations (bsc#1247719).\n - CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).\n - CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n - CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74822 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \u0027file exists\u0027 when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u003cfunction\u003e: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-297,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-297,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-297",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0297-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0297-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260297-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0297-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1246118",
"url": "https://bugzilla.suse.com/1246118"
},
{
"category": "self",
"summary": "SUSE Bug 1247719",
"url": "https://bugzilla.suse.com/1247719"
},
{
"category": "self",
"summary": "SUSE Bug 1247720",
"url": "https://bugzilla.suse.com/1247720"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4674 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47907 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-01-26T16:10:54Z",
"generator": {
"date": "2026-01-26T16:10:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0297-1",
"initial_release_date": "2026-01-26T16:10:54Z",
"revision_history": [
{
"date": "2026-01-26T16:10:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.i586",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.i586",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4674"
}
],
"notes": [
{
"category": "general",
"text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4674",
"url": "https://www.suse.com/security/cve/CVE-2025-4674"
},
{
"category": "external",
"summary": "SUSE Bug 1246118 for CVE-2025-4674",
"url": "https://bugzilla.suse.com/1246118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-4674"
},
{
"cve": "CVE-2025-47906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47906"
}
],
"notes": [
{
"category": "general",
"text": "If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\"\", \".\", and \"..\"), can result in the binaries listed in the PATH being unexpectedly returned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47906",
"url": "https://www.suse.com/security/cve/CVE-2025-47906"
},
{
"category": "external",
"summary": "SUSE Bug 1247719 for CVE-2025-47906",
"url": "https://bugzilla.suse.com/1247719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47906"
},
{
"cve": "CVE-2025-47907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47907"
}
],
"notes": [
{
"category": "general",
"text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47907",
"url": "https://www.suse.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "SUSE Bug 1247720 for CVE-2025-47907",
"url": "https://bugzilla.suse.com/1247720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47907"
},
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2025:21192-1
Vulnerability from csaf_suse - Published: 2025-12-12 07:24 - Updated: 2025-12-12 07:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.5.\n\nSecurity issues fixed:\n\n- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation\n (bsc#1254431).\n- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion\n (bsc#1251258).\n- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n- CVE-2025-47910: net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n\nOther issues fixed and changes:\n\n- Version 1.25.5:\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access\n is denied, ReOpenFile error handling followup\n\n- Version 1.25.4:\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access\n is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n\n- Version 1.25.3:\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n\n- Version 1.25.2:\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \"file exists\" when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n\n- Version 1.25.1:\n * go#74822 cmd/go: \"get toolchain@latest\" should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n\n- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).\n- Fix runtime condition for gcc/gcc7 dependency.\n- Use at least gcc 7 for all architectures (bsc#1254227).\n- Package svgpan.js to fix issues with \"go tool pprof\" (boo#1249985).\n- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-102",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_21192-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:21192-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202521192-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:21192-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2025-12-12T07:24:50Z",
"generator": {
"date": "2025-12-12T07:24:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:21192-1",
"initial_release_date": "2025-12-12T07:24:50Z",
"revision_history": [
{
"date": "2025-12-12T07:24:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.5-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.5-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.5-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.5-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-1.25.5-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.5-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.5-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.5-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
SUSE-SU-2026:0298-1
Vulnerability from csaf_suse - Published: 2026-01-26 16:11 - Updated: 2026-01-26 16:11Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\nUpdate to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):\n\nSecurity fixes:\n\n - CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).\n - CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations (bsc#1247719).\n - CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).\n - CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n - CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74822 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \u0027file exists\u0027 when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u003cfunction\u003e: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-298,SUSE-SLE-Module-Development-Tools-15-SP7-2026-298,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-298,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-298,openSUSE-SLE-15.6-2026-298",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0298-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0298-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260298-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0298-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1246118",
"url": "https://bugzilla.suse.com/1246118"
},
{
"category": "self",
"summary": "SUSE Bug 1247719",
"url": "https://bugzilla.suse.com/1247719"
},
{
"category": "self",
"summary": "SUSE Bug 1247720",
"url": "https://bugzilla.suse.com/1247720"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4674 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47907 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-01-26T16:11:04Z",
"generator": {
"date": "2026-01-26T16:11:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0298-1",
"initial_release_date": "2026-01-26T16:11:04Z",
"revision_history": [
{
"date": "2026-01-26T16:11:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.i586",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.i586",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4674"
}
],
"notes": [
{
"category": "general",
"text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4674",
"url": "https://www.suse.com/security/cve/CVE-2025-4674"
},
{
"category": "external",
"summary": "SUSE Bug 1246118 for CVE-2025-4674",
"url": "https://bugzilla.suse.com/1246118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-4674"
},
{
"cve": "CVE-2025-47906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47906"
}
],
"notes": [
{
"category": "general",
"text": "If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\"\", \".\", and \"..\"), can result in the binaries listed in the PATH being unexpectedly returned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47906",
"url": "https://www.suse.com/security/cve/CVE-2025-47906"
},
{
"category": "external",
"summary": "SUSE Bug 1247719 for CVE-2025-47906",
"url": "https://bugzilla.suse.com/1247719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47906"
},
{
"cve": "CVE-2025-47907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47907"
}
],
"notes": [
{
"category": "general",
"text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47907",
"url": "https://www.suse.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "SUSE Bug 1247720 for CVE-2025-47907",
"url": "https://bugzilla.suse.com/1247720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47907"
},
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2025:4337-1
Vulnerability from csaf_suse - Published: 2025-12-09 23:51 - Updated: 2025-12-09 23:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\ngo1.24.11 (released 2025-12-02) includes two security fixes to\nthe crypto/x509 package, as well as bug fixes to the runtime. (bsc#1236217)\n\nCVE-2025-61727 CVE-2025-61729:\n\n * go#76460 go#76445 bsc#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation\n * go#76463 go#76442 bsc#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN\n\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n\n- Packaging: Migrate from update-alternatives to libalternatives (bsc#1245878)\n * This is an optional migration controlled via prjconf definition\n with_libalternatives\n * If with_libalternatives is not defined packaging continues to\n use update-alternatives\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4337,SUSE-SLE-Module-Development-Tools-15-SP6-2025-4337,SUSE-SLE-Module-Development-Tools-15-SP7-2025-4337,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4337,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4337,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4337,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4337,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4337,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4337,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4337,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4337,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4337,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4337,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4337,SUSE-Storage-7.1-2025-4337,openSUSE-SLE-15.6-2025-4337",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4337-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4337-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254337-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4337-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023492.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2025-12-09T23:51:31Z",
"generator": {
"date": "2025-12-09T23:51:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4337-1",
"initial_release_date": "2025-12-09T23:51:31Z",
"revision_history": [
{
"date": "2025-12-09T23:51:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-150000.1.50.1.aarch64",
"product": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64",
"product_id": "go1.24-1.24.11-150000.1.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"product_id": "go1.24-doc-1.24.11-150000.1.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"product": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"product_id": "go1.24-race-1.24.11-150000.1.50.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-150000.1.50.1.i586",
"product": {
"name": "go1.24-1.24.11-150000.1.50.1.i586",
"product_id": "go1.24-1.24.11-150000.1.50.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-150000.1.50.1.i586",
"product": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.i586",
"product_id": "go1.24-doc-1.24.11-150000.1.50.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"product": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"product_id": "go1.24-1.24.11-150000.1.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"product_id": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"product_id": "go1.24-race-1.24.11-150000.1.50.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-150000.1.50.1.s390x",
"product": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x",
"product_id": "go1.24-1.24.11-150000.1.50.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"product": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"product_id": "go1.24-doc-1.24.11-150000.1.50.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"product": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"product_id": "go1.24-race-1.24.11-150000.1.50.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-150000.1.50.1.x86_64",
"product": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64",
"product_id": "go1.24-1.24.11-150000.1.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"product_id": "go1.24-doc-1.24.11-150000.1.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"product": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"product_id": "go1.24-race-1.24.11-150000.1.50.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T23:51:31Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T23:51:31Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
SUSE-SU-2025:4336-1
Vulnerability from csaf_suse - Published: 2025-12-09 23:50 - Updated: 2025-12-09 23:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\ngo1.25.5 (released 2025-12-02) includes two security fixes to the\ncrypto/x509 package, as well as bug fixes to the mime and os\npackages.\n(bsc#1244485)\n\n CVE-2025-61729 CVE-2025-61727:\n\n * go#76461 go#76445 bsc#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation\n * go#76464 go#76442 bsc#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n\n- Packaging: Migrate from update-alternatives to libalternatives (bsc#1245878)\n\n * This is an optional migration controlled via prjconf definition\n with_libalternatives\n * If with_libalternatives is not defined packaging continues to\n use update-alternatives\n\ngo1.25.4 (released 2025-11-05) includes fixes to the compiler,\nthe runtime, and the crypto/subtle, encoding/pem, net/url, and os\npackages. (bsc#1244485)\n\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4336,SUSE-SLE-Module-Development-Tools-15-SP6-2025-4336,SUSE-SLE-Module-Development-Tools-15-SP7-2025-4336,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4336,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4336,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4336,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4336,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4336,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4336,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4336,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4336,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4336,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4336,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4336,SUSE-Storage-7.1-2025-4336,openSUSE-SLE-15.6-2025-4336",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4336-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4336-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254336-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4336-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023493.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2025-12-09T23:50:12Z",
"generator": {
"date": "2025-12-09T23:50:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4336-1",
"initial_release_date": "2025-12-09T23:50:12Z",
"revision_history": [
{
"date": "2025-12-09T23:50:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-150000.1.23.1.aarch64",
"product": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64",
"product_id": "go1.25-1.25.5-150000.1.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"product_id": "go1.25-doc-1.25.5-150000.1.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"product": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"product_id": "go1.25-race-1.25.5-150000.1.23.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-150000.1.23.1.i586",
"product": {
"name": "go1.25-1.25.5-150000.1.23.1.i586",
"product_id": "go1.25-1.25.5-150000.1.23.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-150000.1.23.1.i586",
"product": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.i586",
"product_id": "go1.25-doc-1.25.5-150000.1.23.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"product": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"product_id": "go1.25-1.25.5-150000.1.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"product_id": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"product_id": "go1.25-race-1.25.5-150000.1.23.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-150000.1.23.1.s390x",
"product": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x",
"product_id": "go1.25-1.25.5-150000.1.23.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"product": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"product_id": "go1.25-doc-1.25.5-150000.1.23.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"product": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"product_id": "go1.25-race-1.25.5-150000.1.23.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-150000.1.23.1.x86_64",
"product": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64",
"product_id": "go1.25-1.25.5-150000.1.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"product_id": "go1.25-doc-1.25.5-150000.1.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"product": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"product_id": "go1.25-race-1.25.5-150000.1.23.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T23:50:12Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T23:50:12Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
cleanstart-2025-ob44035
Vulnerability from cleanstart
Multiple security vulnerabilities affect the velero-fips package. These issues are resolved in later releases. See references for individual CVE and GHSA details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "velero-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Multiple security vulnerabilities affect the velero-fips package. These issues are resolved in later releases. See references for individual CVE and GHSA details.",
"id": "CLEANSTART-2025-OB44035",
"modified": "2025-12-13T08:34:16Z",
"published": "2026-01-16T11:28:43.176297Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2025/CLEANSTART-2025-OB44035.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
}
],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61729, GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 1.16.2-r2",
"upstream": [
"CVE-2025-61729",
"GHSA-f6x5-jh6r-wrfv",
"GHSA-j5w8-q4qc-rx2x"
]
}
cleanstart-2025-yj25356
Vulnerability from cleanstart
Security vulnerability affects the tigera-operator package. This issue is resolved in later releases. See references for CVE details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "tigera-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.40.2-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Security vulnerability affects the tigera-operator package. This issue is resolved in later releases. See references for CVE details.",
"id": "CLEANSTART-2025-YJ25356",
"modified": "2025-12-06T13:34:11Z",
"published": "2026-01-16T12:00:45.358320Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2025/CLEANSTART-2025-YJ25356.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
}
],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61729 applied in versions: 1.40.2-r0",
"upstream": [
"CVE-2025-61729"
]
}
cleanstart-2025-eu07511
Vulnerability from cleanstart
Multiple security vulnerabilities affect the vault-k8s package. These issues are resolved in later releases. See references for individual CVE details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "vault-k8s"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.7.1-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Multiple security vulnerabilities affect the vault-k8s package. These issues are resolved in later releases. See references for individual CVE details.",
"id": "CLEANSTART-2025-EU07511",
"modified": "2025-12-06T13:34:11Z",
"published": "2026-01-16T11:58:32.440192Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2025/CLEANSTART-2025-EU07511.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47912"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47912"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
}
],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47912, CVE-2025-58183, CVE-2025-58185, CVE-2025-58186, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729 applied in versions: 1.7.0-r0, 1.7.1-r0",
"upstream": [
"CVE-2025-47912",
"CVE-2025-58183",
"CVE-2025-58185",
"CVE-2025-58186",
"CVE-2025-58187",
"CVE-2025-58188",
"CVE-2025-58189",
"CVE-2025-61723",
"CVE-2025-61724",
"CVE-2025-61725",
"CVE-2025-61729"
]
}
cleanstart-2025-jl63399
Vulnerability from cleanstart
Security vulnerability affects the trust-manager package. This issue is resolved in later releases. See references for CVE details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "trust-manager"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.20.2-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Security vulnerability affects the trust-manager package. This issue is resolved in later releases. See references for CVE details.",
"id": "CLEANSTART-2025-JL63399",
"modified": "2025-12-06T13:34:11Z",
"published": "2026-01-16T12:00:43.312220Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2025/CLEANSTART-2025-JL63399.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
}
],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61729 applied in versions: 0.20.2-r1",
"upstream": [
"CVE-2025-61729"
]
}
FKIE_CVE-2025-61729
Vulnerability from fkie_nvd - Published: 2025-12-02 19:15 - Updated: 2025-12-19 18:25| URL | Tags | ||
|---|---|---|---|
| security@golang.org | https://go.dev/cl/725920 | Patch | |
| security@golang.org | https://go.dev/issue/76445 | Issue Tracking, Patch | |
| security@golang.org | https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 | Mailing List, Release Notes | |
| security@golang.org | https://pkg.go.dev/vuln/GO-2025-4155 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2E6FD2A-A487-4099-B91D-2429F286AC6D",
"versionEndExcluding": "1.24.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39C03A37-B94B-46E4-B1C2-A70A870F8E53",
"versionEndExcluding": "1.25.5",
"versionStartIncluding": "1.25.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption."
}
],
"id": "CVE-2025-61729",
"lastModified": "2025-12-19T18:25:28.283",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-12-02T19:15:51.447",
"references": [
{
"source": "security@golang.org",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/725920"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://go.dev/issue/76445"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Release Notes"
],
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
bit-golang-2025-61729
Vulnerability from bitnami_vulndb
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "golang",
"purl": "pkg:bitnami/golang"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.11"
},
{
"introduced": "1.25.0"
},
{
"fixed": "1.25.5"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2025-61729"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"id": "BIT-golang-2025-61729",
"modified": "2025-12-04T12:07:39.656Z",
"published": "2025-12-04T11:41:52.637Z",
"references": [
{
"type": "WEB",
"url": "https://go.dev/cl/725920"
},
{
"type": "WEB",
"url": "https://go.dev/issue/76445"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"schema_version": "1.6.2",
"summary": "Excessive resource consumption when printing error string for host certificate validation in crypto/x509"
}
GHSA-7C64-F9JR-V9H2
Vulnerability from github – Published: 2025-12-02 21:31 – Updated: 2025-12-03 00:30Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
{
"affected": [],
"aliases": [
"CVE-2025-61729"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-02T19:15:51Z",
"severity": "HIGH"
},
"details": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"id": "GHSA-7c64-f9jr-v9h2",
"modified": "2025-12-03T00:30:28Z",
"published": "2025-12-02T21:31:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://go.dev/cl/725920"
},
{
"type": "WEB",
"url": "https://go.dev/issue/76445"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-2724
Vulnerability from csaf_certbund - Published: 2025-12-02 23:00 - Updated: 2026-02-04 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um Sicherheitsvorkehrungen zu umgehen, und um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2724 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2724.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2724 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2724"
},
{
"category": "external",
"summary": "Golang Announce vom 2025-12-02",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "Golang/Go GitHub vom 2025-12-02",
"url": "https://github.com/golang/go/issues/76445"
},
{
"category": "external",
"summary": "Golang/Go GitHub vom 2025-12-02",
"url": "https://github.com/golang/go/issues/76442"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2025-12-09",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4337-1 vom 2025-12-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6FRZFUY7IMUIH434HM7TP3Z4LTXGEXM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4336-1 vom 2025-12-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQKJBVGIUPQFJGOASKZKHJ56ON2DGRDD/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4337-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023492.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4336-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023493.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20157-1 vom 2025-12-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2U4ZHXRG6FRV2PVCQEFXC42LYXWQIXQG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21192-1 vom 2025-12-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21193-1 vom 2025-12-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2025-090 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2025-091 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-091.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3119 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3119.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3118 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3118.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3120 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3120.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-083 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-083.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-084 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-084.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3098 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3098.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3100 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3100.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3097 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3097.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-082 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-082.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-081 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-081.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3105 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3105.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-080 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-080.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2025-079 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2025-079.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2025-087 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-087.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2025-088 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-088.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2025-089 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-089.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2025-090 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2025-091 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-091.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2025-092 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-092.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2025-093 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-093.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2025-094 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2025-094.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2025-086 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-086.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2025-087 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-087.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2025-088 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-088.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2025-089 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2025-089.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10030-1 vom 2026-01-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOH4RQD6DF6QJ5K5LPUZIBSPIUJOV4WF/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10031-1 vom 2026-01-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4YDMFDXLFWYJ3MDUGV7CSZRLJCE7BFT/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0921 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0921"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0922 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0922"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0923 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0923.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2026-094 vom 2026-01-22",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-094.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0923 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0923"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0921 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0921.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-085 vom 2026-01-22",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-085.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0922 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0922.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0921 vom 2026-01-22",
"url": "https://errata.build.resf.org/RLSA-2026:0921"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0923 vom 2026-01-22",
"url": "https://errata.build.resf.org/RLSA-2026:0923"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1038 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:1038"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1017 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1018 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1042 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:1042"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0922 vom 2026-01-23",
"url": "https://errata.build.resf.org/RLSA-2026:0922"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1168 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1168"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0297-1 vom 2026-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1249 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1249"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0298-1 vom 2026-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Q63UO2LYEIXNPXRBOE6F42PWFVTQ6LQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0296-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1344 vom 2026-01-27",
"url": "https://access.redhat.com/errata/RHSA-2026:1344"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1344 vom 2026-01-28",
"url": "https://linux.oracle.com/errata/ELSA-2026-1344.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1416 vom 2026-01-27",
"url": "https://access.redhat.com/errata/RHSA-2026:1416"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1431 vom 2026-01-27",
"url": "https://access.redhat.com/errata/RHSA-2026:1431"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1344 vom 2026-01-28",
"url": "https://errata.build.resf.org/RLSA-2026:1344"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1497 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1497"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1506 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1506"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0308-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1518 vom 2026-01-29",
"url": "https://access.redhat.com/errata/RHSA-2026:1518"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1518 vom 2026-01-29",
"url": "https://linux.oracle.com/errata/ELSA-2026-1518.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1518 vom 2026-01-31",
"url": "https://errata.build.resf.org/RLSA-2026:1518"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7259319 vom 2026-01-30",
"url": "https://www.ibm.com/support/pages/node/7259319"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1715 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1715"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1715 vom 2026-02-02",
"url": "http://linux.oracle.com/errata/ELSA-2026-1715.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1814 vom 2026-02-03",
"url": "https://access.redhat.com/errata/RHSA-2026:1814"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1813 vom 2026-02-03",
"url": "https://access.redhat.com/errata/RHSA-2026:1813"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1845 vom 2026-02-03",
"url": "https://access.redhat.com/errata/RHSA-2026:1845"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1907 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1907"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1938 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1938"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1715 vom 2026-02-05",
"url": "https://errata.build.resf.org/RLSA-2026:1715"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1896 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1896"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1942 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1908 vom 2026-02-05",
"url": "https://errata.build.resf.org/RLSA-2026:1908"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-04T23:00:00.000+00:00",
"generator": {
"date": "2026-02-05T09:39:52.316+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2724",
"initial_release_date": "2025-12-02T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-02T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-12-09T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Go und SUSE aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux, Amazon und Red Hat aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und IBM aufgenommen"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat und Rocky Enterprise Software Foundation aufgenommen"
}
],
"status": "final",
"version": "17"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.25.5",
"product": {
"name": "Golang Go \u003c1.25.5",
"product_id": "T049032"
}
},
{
"category": "product_version",
"name": "1.25.5",
"product": {
"name": "Golang Go 1.25.5",
"product_id": "T049032-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.25.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.24.11",
"product": {
"name": "Golang Go \u003c1.24.11",
"product_id": "T049033"
}
},
{
"category": "product_version",
"name": "1.24.11",
"product": {
"name": "Golang Go 1.24.11",
"product_id": "T049033-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.24.11"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM Business Automation Workflow",
"product": {
"name": "IBM Business Automation Workflow",
"product_id": "T024464",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:containers"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "azl3",
"product": {
"name": "Microsoft Azure Linux azl3",
"product_id": "T049210",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_linux:azl3"
}
}
}
],
"category": "product_name",
"name": "Azure Linux"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"product_status": {
"known_affected": [
"T002207",
"T049033",
"67646",
"T049032",
"T027843",
"T024464",
"398363",
"T049210",
"T004914",
"T032255"
]
},
"release_date": "2025-12-02T23:00:00.000+00:00",
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"product_status": {
"known_affected": [
"T002207",
"T049033",
"67646",
"T049032",
"T027843",
"T024464",
"398363",
"T049210",
"T004914",
"T032255"
]
},
"release_date": "2025-12-02T23:00:00.000+00:00",
"title": "CVE-2025-61729"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.